SWORD: Self-propagating Worm Observation and Rapid Detection
نویسندگان
چکیده
As the launching of a worm can have disastrous effects on the Internet in just minutes, it is essential to automatically and reliably detect worms in their early stages. In contrast to content-based approaches, in this paper we study the feasibility of a behavior-based solution through our SWORD framework. As SWORD does not inspect the payload of traffic, it is resilient against polymorphic worms and avoids the expense of examining traffic payload. We focus on three algorithms embraced in the SWORD framework: the causal similarity identification algorithm, destination address distribution analysis algorithm, and continuity analysis algorithm. We investigate how they may identify worm-like connections and raise an alarm by identifying essential behaviors that a worm must display. Our evaluation shows that SWORD exhibits promise in quickly, accurately, and efficiently detecting self-propagating worms of different speeds and scanning methods. We also point out extensions to SWORD that can detect infected hosts and classify a worm based on its behavior. Although some limitations and open issues remain, SWORD is an important step toward detecting zero-day self-propagating worms via a behavior-based approach.
منابع مشابه
On the Performance of SWORD in Detecting Zero-Day-Worm-Infected Hosts
Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the adv...
متن کاملEnhancing SWORD to Detect Zero-Day-Worm-Infected Hosts
Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the adv...
متن کاملA Survey of Worm Detection and Containment
The self-duplicating, self-propagating malicious codes, known as computer worms, spread themselves without any human interaction and launch the most destructive attacks against computer networks. At the same time, being fully automated makes their behavior repetitious and predictable. This paper presents a survey an d comparison of Internet worm detection and containment schemes. We first ident...
متن کاملMonitoring and Early Detection of Internet Worms
After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagating worm can quickly spread across the Internet and cause severe damage to our society. Facing this great security threat, we need to build an early detection system that can detect the presence of a worm in the Internet as quickly as possible in order to give people accurate early warning informati...
متن کاملComparative Analysis of Behavioral Classification of Computer Networks and Early Warning System for Worm Detection
The effort required for detecting worm that threaten the reliability and stability of network resources is in the process of advancing, demanding increasingly sophisticated resources. A worm is a self-propagating program that infects other hosts based on a known vulnerability in network hosts. The spread of active worms does not need any human interaction. There is a growing demand for effectiv...
متن کامل