An efficient worm defense system based signature extraction

被引:0
|
作者
Tu, Hao [1 ,2 ]
Li, Zhitang [1 ,2 ]
Liu, Bin [1 ,2 ]
Zhang, Yejiang [2 ]
机构
[1] Huazhong Univ Sci & Technol, Network & Comp Ctr, Wuhan, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING | 2008年
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The fast spread of worm is a great challenge to Internet security. Most current defense systems use signature matching approach while most signatures are developed manually. It is difficult. to catch variety of new worms promptly. An efficient worm defense system is designed and implemented to provide early warning at the moment the worms start to spread on the network and to contain or slow down the spread of the worm by automatically extracting a signature that could be used by firewalls or Intrusion Prevention Systems. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware. signature generation: method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system. Experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:364 / 370
页数:7
相关论文
共 50 条
  • [1] An Efficient Worm Defense System Based Signature Extraction
    Tu, Hao
    Li, Zhitang
    Liu, Bin
    Zhang, Yejiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01) : 23 - 23
  • [2] Worm detection and signature extraction based on communication characteristics
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    不详
    Tongxin Xuebao, 2007, 12 (1-7):
  • [3] Honeypot Based Signature Generation for Defense Against Polymorphic Worm Attacks in Networks
    Paul, Sounak
    Mishra, Bimal Kumar
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 159 - 163
  • [4] Mining Network Traffic for Worm Signature Extraction
    Tu, Hao
    Li, Zhitang
    Liu, Bin
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 327 - 331
  • [5] Efficient information extraction based on signature index
    Department of Computer Science and Engineering, Zhejiang University City College, Hangzhou, China
    不详
    不详
    Int. J. Database Theory Appl., 2 (33-42):
  • [6] Design of Worm Defense System for the Enterprise Network
    Luo, Jun
    Wang, Yu
    Yan, Lianlong
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 826 - 831
  • [7] Online Oral Defense System Based on Threshold Proxy Signature
    Li, Fengying
    Xue, Qingshui
    COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 110 - +
  • [8] Research on Worm Detection and Active Defense System
    Gao Wei-min
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 490 - 493
  • [9] Online Oral Defense System Based on Threshold Proxy Signature
    Li, Fengying
    Xue, Qingshui
    2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 427 - 431
  • [10] Combined Behavior- and Signature-Based Internet Worm Detection System
    Altaher, Altyeb
    Ramadass, Sureswaran
    Meulenberg, Andrew
    Abdat, Mustafa
    Ali, Ammar
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4213 - 4222