Mining Network Traffic for Worm Signature Extraction

被引:0
|
作者
Tu, Hao
Li, Zhitang
Liu, Bin
机构
来源
FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS | 2008年
关键词
D O I
10.1109/FSKD.2008.434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent worm increasingly threaten the availability of Internet. It is difficult to catch variety of 0day worms promptly with current signature matching approach because most signatures are developed manually. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware signature generation method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcpdump data are used to test the prototype system and experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.
引用
收藏
页码:327 / 331
页数:5
相关论文
共 50 条
  • [41] Mining Method for Road Traffic Network Synchronization Control Area
    Zheng, Lili
    Liu, Hu
    Ding, Tongqiang
    Xing, Ruru
    Hu, Xinyue
    GREEN INTELLIGENT TRANSPORTATION SYSTEMS, 2018, 419 : 949 - 959
  • [42] A data mining based algorithm for traffic network flow forecasting
    Gong, XY
    Liu, XM
    INTERNATIONAL CONFERENCE ON INTEGRATION OF KNOWLEDGE INTENSIVE MULTI-AGENT SYSTEMS: KIMAS'03: MODELING, EXPLORATION, AND ENGINEERING, 2003, : 243 - 248
  • [43] Traffic Disturbance Mining and Feedforward Neural Network to Enhance the Immune Network Control Performance
    Louati, Ali
    Masmoudi, Fatma
    Lahyani, Rahma
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2022, VOL 1, 2023, 447 : 99 - 106
  • [44] Automatic Worm Signature Generation Based on Vulnerability
    Zhang Chunhua
    Guo Shanqing
    Cui Lizheng
    Xu Qiuliang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 83 - 86
  • [45] Effective behavior signature extraction method using sequence pattern algorithm for traffic identification
    Shim, Kyu-Seok
    Yoon, Sung-Ho
    Sija, Baraka D.
    Park, Jun-Sang
    Cho, Kyunghee
    Kim, Myung-Sup
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2018, 28 (02)
  • [46] Trip extraction for traffic analysis using cellular network data
    Breyer, Nils
    Gundlegard, David
    Rydergren, Clas
    Backman, Johan
    2017 5TH IEEE INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2017, : 321 - 326
  • [47] An optimized feature extraction algorithm for abnormal network traffic detection
    Chen, Jinfu
    Chen, Yuhao
    Cai, Saihua
    Yin, Shang
    Zhao, Lingling
    Zhang, Zikang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 149 : 330 - 342
  • [48] Automated Extraction of Network Traffic Models Suitable for Performance Simulation
    Rygielski, Piotr
    Simko, Viliam
    Sittner, Felix
    Aschenbrenner, Doris
    Kounev, Samuel
    Schilling, Klaus
    PROCEEDINGS OF THE 2016 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE'16), 2016, : 27 - 35
  • [49] Automatic Fingerprint Extraction of Mobile APP Users in Network Traffic
    Sun, Faqiang
    Zhao, Li
    Zhou, Bo
    Wang, Yong
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA 2020), 2020, : 150 - 155
  • [50] Forged Signature Distinction Using Convolutional Neural Network for Feature Extraction
    Nam, Seungsoo
    Park, Hosung
    Seo, Changho
    Choi, Daeseon
    APPLIED SCIENCES-BASEL, 2018, 8 (02):