Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
نویسندگان
چکیده
Cooperative defensive systems communicate and cooperate in their response to worm attacks, but determine the presence of a worm attack solely on local information. Distributed worm detection and immunization systems track suspicious behavior at multiple cooperating nodes to determine whether a worm attack is in progress. Earlier work has shown that cooperative systems can respond quickly to day-zero worms, while distributed defensive systems allow detectors to be more conservative (i.e. paranoid) about potential attacks because they manage false alarms efficiently. In this paper we begin a preliminary investigation into the complex tradeoffs in such systems between communication costs, computation overhead, accuracy of the local tests, estimation of viral virulence, and the fraction of the network infected before the attack crests. We evaluate the effectiveness of different system configurations in various simulations. Our experiments show that distributed algorithms are better able to balance effectiveness against viruses with reduced cost in computation and communication when faced with false alarms. Furthermore, cooperative, distributed systems seem more robust against malicious participants in the immunization system than earlier cooperative but non-distributed
منابع مشابه
PolyS: Network-based Signature Generation for Zero-day Polymorphic Worms
With growing sophistication of computer worms, it is very important to detect and prevent the worms quickly and accurately at their early phase of infection. Traditional signature based IDS, though effective for known attacks but failed to handle the zero-day attack promptly. Recent works on polymorphic worms does not guarantee accurate signature in presence of noise in suspicious flow samples....
متن کاملDetecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm
Zero-day polymorphic worms pose a serious threat to the security of Mobile systems and Internet infrastructure. In many cases, it is difficult to detect worm attacks at an early stage. There is typically little or no time to develop a well-constructed solution during such a worm outbreak. This is because the worms act only to spread from node to node and they bring security concerns to everyone...
متن کاملARP-based Detection of Scanning Worms Within an Enterprise Network
Rapidly propagating worms are arguably the greatest security threat currently facing the Internet. To date, worm writers have been successful in penetrating most security countermeasures. Signature-based detection schemes often fail to detect zero-day worms, and their ability to rapidly react to new threats is limited as they typically require some form of human involvement to formulate updated...
متن کاملShape Optimization of an abrupt contraction using numerical streamlining
This research was conducted to find a reliable technique to shape an abrupt contraction for minimizing the energy loss. The method may find broader applications in design of variety of transitional cross-sections in hydraulic structures. The streamlines in a 2-D contraction were calculated through solving the potential flow equations in rectangular and curvilinear coordinates. The natural cubic...
متن کاملEvaluation of Soil Liquefaction Potential by Sensitivity Analysis, Reliability and Data validation
In this study, it is attempted to analyze sensitivity and reliability in order to evaluate the liquefaction potential in soil layers in Tabriz. 62 boreholes that had possible conditions for liquefaction were selected. Seismic mapping was simulated using finite fault method and then the effect of soil layers on PGA was estimated. In continue, the liquefaction potential index was estimated and th...
متن کامل