An efficient worm defense system based signature extraction

被引:0
|
作者
Tu, Hao [1 ,2 ]
Li, Zhitang [1 ,2 ]
Liu, Bin [1 ,2 ]
Zhang, Yejiang [2 ]
机构
[1] Huazhong Univ Sci & Technol, Network & Comp Ctr, Wuhan, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING | 2008年
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The fast spread of worm is a great challenge to Internet security. Most current defense systems use signature matching approach while most signatures are developed manually. It is difficult. to catch variety of new worms promptly. An efficient worm defense system is designed and implemented to provide early warning at the moment the worms start to spread on the network and to contain or slow down the spread of the worm by automatically extracting a signature that could be used by firewalls or Intrusion Prevention Systems. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware. signature generation: method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system. Experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:364 / 370
页数:7
相关论文
共 50 条
  • [21] Defense in depth gets the worm
    Wildstrom, S
    COMMUNICATIONS OF THE ACM, 2004, 47 (02) : 11 - 11
  • [22] Email worm modeling and defense
    Zou, CC
    Towsley, D
    Gong, WB
    ICCCN 2004: 13TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2004, : 409 - 414
  • [23] A fast vaccine distribution mechanism in Worm Defense System for mobile network
    Guo, Ye
    Zhu, Miaoliang
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1198 - 1201
  • [24] An Efficient and Secure Identity-Based Signature System for Underwater Green Transport System
    Zhou, Zhili
    Gupta, Brij Bhooshan
    Gaurav, Akshat
    Li, Yujiang
    Lytras, Miltiadis D.
    Nedjah, Nadia
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (09) : 16161 - 16169
  • [25] The Efficient Signature in the smart card system
    Yang, HK
    An, YH
    APCCAS '98 - IEEE ASIA-PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS: MICROELECTRONICS AND INTEGRATING SYSTEMS, 1998, : 499 - 502
  • [26] Offline Signature Verification System Using Grid and Tree Based Feature Extraction
    Shukla, Amit Kishore
    Mohan, Pulkit
    Ojha, Gaurav
    Wariya, Manoj
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 784 - 789
  • [27] A signature based approach to regularity extraction
    Arikati, SR
    Varadarajan, R
    1997 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN - DIGEST OF TECHNICAL PAPERS, 1997, : 542 - 545
  • [28] An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding
    Wang, Jie
    Wang, Jianxin
    Chen, Jianer
    Zhang, Xi
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 926 - +
  • [29] Automated signature generation approach for polymorphic worm based on color coding
    Wang J.
    Wang J.-X.
    Chen J.-E.
    Ruan Jian Xue Bao/Journal of Software, 2010, 21 (10): : 2599 - 2609
  • [30] GNSS interferometric reflectometry signature-based defense
    Lewis, Steven W.
    Chow, C. Edward
    Geremia-Nievinski, Felipe
    Akos, Dennis M.
    Lo, Sherman
    NAVIGATION-JOURNAL OF THE INSTITUTE OF NAVIGATION, 2020, 67 (04): : 727 - 743