An efficient worm defense system based signature extraction

被引:0
|
作者
Tu, Hao [1 ,2 ]
Li, Zhitang [1 ,2 ]
Liu, Bin [1 ,2 ]
Zhang, Yejiang [2 ]
机构
[1] Huazhong Univ Sci & Technol, Network & Comp Ctr, Wuhan, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING | 2008年
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The fast spread of worm is a great challenge to Internet security. Most current defense systems use signature matching approach while most signatures are developed manually. It is difficult. to catch variety of new worms promptly. An efficient worm defense system is designed and implemented to provide early warning at the moment the worms start to spread on the network and to contain or slow down the spread of the worm by automatically extracting a signature that could be used by firewalls or Intrusion Prevention Systems. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware. signature generation: method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system. Experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:364 / 370
页数:7
相关论文
共 50 条
  • [31] Research on Intrusion and Defense of P2P-Based Worm
    Lu Chuiwei
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 540 - 543
  • [32] Immunity Based Worm Detection System
    洪征
    吴礼发
    王元元
    JournalofBeijingInstituteofTechnology, 2007, (01) : 67 - 73
  • [33] Design of a worm isolation and unknown worm monitoring system based on Honeypot
    Nasser A, AlFraih AbdulAziz
    Chen, Wenbo
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 656 - 659
  • [34] A Proposal of Patrol Function by White-Hat Worm in Botnet Defense System
    Makihara, Daisuke
    Yamaguchi, Shingo
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-ASIA (ICCE-ASIA), 2021,
  • [35] A secure and efficient certificateless content extraction signature with privacy protection
    Zhao, Can
    Liu, Jiabing
    Zheng, Fuyong
    Wang, Dejun
    Meng, Bo
    PLOS ONE, 2021, 16 (11):
  • [36] A Simple and Efficient Signature-Based Consensus Protocol in the Asynchronous Distributed System
    Cheng, Chien-Fu
    Tsai, Kuo-Tang
    Liao, Hsien-Chun
    INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (02): : 183 - 198
  • [37] Vaccine Distribution Path Optimization in Agent-Oriented Worm Defense System
    Guo, Ye
    Zhu, Miaoliang
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (04): : 166 - 171
  • [38] Models and analysis of active worm defense
    Nicol, DM
    Liljenstam, M
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 38 - 53
  • [39] Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
    Kamran Shafi
    Hussein A. Abbass
    Pattern Analysis and Applications, 2013, 16 : 549 - 566
  • [40] Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection
    Shafi, Kamran
    Abbass, Hussein A.
    PATTERN ANALYSIS AND APPLICATIONS, 2013, 16 (04) : 549 - 566