Mining Network Traffic for Worm Signature Extraction

被引:0
|
作者
Tu, Hao
Li, Zhitang
Liu, Bin
机构
来源
FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS | 2008年
关键词
D O I
10.1109/FSKD.2008.434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent worm increasingly threaten the availability of Internet. It is difficult to catch variety of 0day worms promptly with current signature matching approach because most signatures are developed manually. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware signature generation method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system and experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:327 / 331
页数:5
相关论文
共 50 条
  • [31] Research on neural network and application in traffic rules extraction
    Zhu, Weiliang
    Zhang, Yongli
    Zhao, Yingna
    Journal of Chemical and Pharmaceutical Research, 2014, 6 (03) : 204 - 210
  • [32] Network Traffic Signature Generation Mechanism Using Principal Component Analysis
    Mu Cheng
    Huang Xiaohong
    Wu Jun
    Ma Yan
    CHINA COMMUNICATIONS, 2013, 10 (11) : 95 - 106
  • [33] The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function
    Shim, Kyu-Seok
    Goo, Young-Hoon
    Lee, Min-Seob
    Hasanova, Hum
    Kim, Myung-Sup
    2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2018, : 1335 - 1337
  • [34] Data mining meets Network Analysis: Traffic Prediction Models
    Eterovic, Teo
    Mrdovic, Sasa
    Donko, Dzenana
    Juric, Zeljko
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1479 - 1484
  • [35] Data Mining and Complex Network Algorithms for Traffic Accident Analysis
    Lin, Lei
    Wang, Qian
    Sadek, Adel W.
    TRANSPORTATION RESEARCH RECORD, 2014, (2460) : 128 - 136
  • [36] Developing Data Mining Techniques for Intruder Detection in Network Traffic
    Agrawal, Amar
    Mohammed, Sabah
    Fiaidhi, Jinan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 335 - 342
  • [37] Mining Network Traffic Anomaly Based on Adjustable Piecewise Entropy
    Tian, Geng
    Wang, Zhiliang
    Yin, Xia
    Li, Zimu
    Shi, Xingang
    Lu, Ziyi
    Zhou, Chao
    Yu, Yang
    Guo, Yingya
    2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON QUALITY OF SERVICE (IWQOS), 2015, : 299 - 308
  • [38] Mining Network Traffic for Application Category Recognition on Android Platform
    Wei, Songjie
    Wu, Gaoxiang
    Zhou, Ziyang
    Yang, Ling
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATCS AND COMPUTING (IEEE PIC), 2015, : 409 - 413
  • [39] A data mining based algorithm for traffic network flow forecasting
    Gong, XY
    Liu, XM
    2003 IEEE INTELLIGENT TRANSPORTATION SYSTEMS PROCEEDINGS, VOLS. 1 & 2, 2003, : 193 - 198
  • [40] A data mining based algorithm for traffic network flow forecasting
    Gong, XY
    Liu, XM
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1253 - 1258