An efficient worm defense system based signature extraction

被引:0
|
作者
Tu, Hao [1 ,2 ]
Li, Zhitang [1 ,2 ]
Liu, Bin [1 ,2 ]
Zhang, Yejiang [2 ]
机构
[1] Huazhong Univ Sci & Technol, Network & Comp Ctr, Wuhan, Hubei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan, Hubei, Peoples R China
来源
INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING | 2008年
基金
国家高技术研究发展计划(863计划); 中国国家自然科学基金;
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The fast spread of worm is a great challenge to Internet security. Most current defense systems use signature matching approach while most signatures are developed manually. It is difficult. to catch variety of new worms promptly. An efficient worm defense system is designed and implemented to provide early warning at the moment the worms start to spread on the network and to contain or slow down the spread of the worm by automatically extracting a signature that could be used by firewalls or Intrusion Prevention Systems. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware. signature generation: method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system. Experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:364 / 370
页数:7
相关论文
共 50 条
  • [41] An Efficient Application Traffic Signature Generation System
    Zhang, Yuanming
    Han, Ting
    Hao, Zelin
    Cao, Yu
    Tao, Jing
    2019 10TH IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (ICBK 2019), 2019, : 341 - 347
  • [42] Audio signature extraction based on projections of spectrograms
    Radhakrishnan, Regunathan
    Bauer, Claus
    Cheng, Corey
    Teny, Kent
    2007 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-5, 2007, : 2110 - 2113
  • [43] Automated polymorphic worm signature generation approach based on seed-extending
    Wang, Jie
    He, Xiao-Xian
    Tongxin Xuebao/Journal on Communications, 2014, 35 (09): : 12 - 19
  • [44] Efficient identity based signature schemes based on pairings
    Hess, F
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 310 - 324
  • [45] Ensemble of rankers for efficient gene signature extraction in smoke exposure classification
    Giordano, Maurizio
    Tripathi, Kumar Parijat
    Guarracino, Mario Rosario
    BMC BIOINFORMATICS, 2018, 19
  • [46] A Worm Detection System Based on Deep Learning
    Zhou, Hanxun
    Hu, Yeshuai
    Yang, Xinlin
    Pan, Hong
    Guo, Wei
    Zou, Cliff C.
    IEEE ACCESS, 2020, 8 : 205444 - 205454
  • [47] An Efficient Intrusion Detection System based on Adaptive Acknowledgement with Digital Signature scheme in MANETs
    Santhi, G.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [48] Ensemble of rankers for efficient gene signature extraction in smoke exposure classification
    Maurizio Giordano
    Kumar Parijat Tripathi
    Mario Rosario Guarracino
    BMC Bioinformatics, 19
  • [49] Worm propagation modeling considering green worm defense mechanism in complex networks
    Elham Asadi
    Soodeh Hosseini
    Cluster Computing, 2025, 28 (3)
  • [50] Online handwritten signature verification system based on DWT features extraction and neural network classification
    Fahmy, Maged M. M.
    AIN SHAMS ENGINEERING JOURNAL, 2010, 1 (01) : 59 - 70