Mining Network Traffic for Worm Signature Extraction

被引:0
|
作者
Tu, Hao
Li, Zhitang
Liu, Bin
机构
来源
FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS | 2008年
关键词
D O I
10.1109/FSKD.2008.434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent worm increasingly threaten the availability of Internet. It is difficult to catch variety of 0day worms promptly with current signature matching approach because most signatures are developed manually. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware signature generation method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system and experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:327 / 331
页数:5
相关论文
共 50 条
  • [21] Mobile traffic identification based on application's network signature
    Su, Xin
    Zhang, Dafang
    Dai, Shuaifu
    Zhang, Jianyu
    Wang, Duanbin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (2-3) : 217 - 227
  • [22] Mining Dynamic Network-Wide Traffic States
    Paz, Alexander
    Gaviria, Carlos
    Arteaga, Cristian
    Torres-Jimenez, Jose
    2018 21ST INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2018, : 999 - 1004
  • [23] Mining Conceptual Knowledge from Network Traffic Data for Traffic Measurement Optimization
    Valtchev, Petko
    Mounaouar, Omar
    Cherkaoui, Omar
    Dimitrov, Alexandar
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, KSEM 2015, 2015, 9403 : 157 - 169
  • [24] CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic
    Zhang, Runzi
    Tong, Mingkai
    Chen, Lei
    Xue, Jianxin
    Liu, Wenmao
    Xie, Feng
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 736 - 743
  • [25] Worm detection at network endpoints using information-theoretic traffic perturbations
    Khayam, Syed Ali
    Radha, Hayder
    Loguinov, Dmitri
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1561 - +
  • [26] Worm traffic analysis and characterization
    Dainotti, Alberto
    Pescape, Antonio
    Ventre, Giorgio
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1435 - 1442
  • [27] Research of characteristics of worm traffic
    Chen, YF
    Dong, YB
    Lu, DM
    Xiang, ZT
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 518 - 519
  • [28] Analysis of abnormalities of worm traffic for obtaining worm detection vectors
    Xiang, Zhengtao
    Chen, Yufeng
    Dong, Yabo
    Lao, Honglan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 584 - 589
  • [29] Context Knowledge Extraction using Network Traffic Information
    Aguilar, Jose
    Jerez, Marxjhony
    Pinto, Angel
    Gutierrez de Mesa, Jose
    Montoya, Edwin
    2022 XVLIII LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2022), 2022,
  • [30] Network Intrusion Traffic Detection Based on Feature Extraction
    Yu, Xuecheng
    Huang, Yan
    Zhang, Yu
    Song, Mingyang
    Jia, Zhenhong
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (01): : 473 - 492