Mining Network Traffic for Worm Signature Extraction

被引:0
|
作者
Tu, Hao
Li, Zhitang
Liu, Bin
机构
来源
FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS | 2008年
关键词
D O I
10.1109/FSKD.2008.434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent worm increasingly threaten the availability of Internet. It is difficult to catch variety of 0day worms promptly with current signature matching approach because most signatures are developed manually. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware signature generation method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system and experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:327 / 331
页数:5
相关论文
共 50 条
  • [1] Worm detection and auto-signature extraction in large scale network
    Yi, Xin
    Fangbingxing
    Yunxiaochun
    WSEAS Transactions on Systems, 2005, 4 (04): : 370 - 374
  • [2] Large scale network worm detection using automatic signature extraction
    National Computer Information Content Security Key Laboratory, Harbin Institute of Technology, Harbin 150001, China
    Tongxin Xuebao, 2006, 6 (87-93):
  • [3] Network Traffic Classification by Packet Length Signature Extraction
    Chari, Madhusoodhana S.
    Srinidhi, H.
    Somu, Tamil Esai
    2019 5TH IEEE INTERNATIONAL WIE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (WIECON-ECE 2019), 2019,
  • [4] An Efficient Worm Defense System Based Signature Extraction
    Tu, Hao
    Li, Zhitang
    Liu, Bin
    Zhang, Yejiang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01) : 23 - 23
  • [5] Worm detection and signature extraction based on communication characteristics
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    不详
    Tongxin Xuebao, 2007, 12 (1-7):
  • [6] An efficient worm defense system based signature extraction
    Tu, Hao
    Li, Zhitang
    Liu, Bin
    Zhang, Yejiang
    INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 364 - 370
  • [7] Worm detection in large scale network by traffic
    Xin, Y
    Fang, BX
    Yun, XC
    Chen, HY
    PDCAT 2005: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Proceedings, 2005, : 270 - 272
  • [8] Worm traffic Modeling for network performance analysis
    Chen, Yufeng
    Dong, Yabo
    Lu, Dongming
    Pan, Yunhe
    Lao, Honglan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 578 - 583
  • [9] MINING NETWORK TRAFFIC DATA
    Trajkovic, Ljiljana
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009, : 1 - 2
  • [10] Data mining network traffic
    Lee, Ian W. C.
    Fapojuwo, Abraham O.
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 170 - +