A Novel Worm Detection Model Based on Host Packet Behavior Ranking | SpringerLink
Skip to main content

A Novel Worm Detection Model Based on Host Packet Behavior Ranking

  • Conference paper
On the Move to Meaningful Internet Systems: OTM 2008 (OTM 2008)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5332))

Abstract

Traditional behavior-based worm detection can’t eliminate the influence of the worm-like P2P traffic effectively, as well as detect slow worms. To try to address these problems, this paper first presents a user habit model to describe the factors which influent the generation of network traffic, then a design of HPBRWD (Host Packet Behavior Ranking Based Worm detection) and some key issues about it are introduced. This paper has three contributions to the worm detection: 1) presenting a hierarchical user habit model; 2) using normal software and time profile to eliminate the worm-like P2P traffic and accelerate the detection of worms; 3) presenting HPBRWD to effectively detect worms. Experiments results show that HPBRWD is effective to detect worms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security & Privacy l(4), 33–39 (2003)

    Article  Google Scholar 

  2. Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: Paxson, V. (ed.) Proc. of the 2004 ACM Workshop on Rapid Malcode, pp. 33–42. ACM Press, Washington (2004)

    Chapter  Google Scholar 

  3. Kim, H., Karp, B.: Autograph: Toward automated distributed worm signature detection. In: Proceedings of USENIX Security, San Diego,CA (August 2004)

    Google Scholar 

  4. Kreibich, C., Crowcroft, J.: Honeycomn-creating intrusion detection signatures using honeypots. In: Proceedings of HotNets, Bostom, MA (November 2003)

    Google Scholar 

  5. Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of OSDI, San Francisco, CA (December 2004)

    Google Scholar 

  6. Newsome, J., Karp, B., Song, D.: Polygraph:Automatically generating signatures for polymorphic worms. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA (May 2005)

    Google Scholar 

  7. Roesch, M.: Snort: Lightweight intrusion detection for networks. In: Proceedings of Conference on system administration (November 1999)

    Google Scholar 

  8. Paxson, V.: Bro: a system for detection network intruders in real time. Computer Networks 31 (December 1999)

    Google Scholar 

  9. Si-Han, Q., Wei-Ping, W., et al.: A new approach to forecasting Internet worms based on netlike association analysis. Journal On Communications 25(7), 62–70 (2004)

    Google Scholar 

  10. Staniford-Chen, S., et al.: GrIDS: A Graph-Based Intrusion Detection System for Large Networks. In: Proceedings of the 19th National Information Systems Security Conference, vol. 1, pp. 361–370 (1996)

    Google Scholar 

  11. Dubendorfer, T., Plattner, B.: Host Behavior Based Early Detection of Worm Outbreaks in Internet Backbones. In: Proceedings of 14th IEEE WET ICE/STCA security workshop, pp. 166–171 (2005)

    Google Scholar 

  12. Zou, C.C., Gong, W., Towsley, D., et al.: Monitoring and early detection of internet worms[A]. In: Proceedings of the 10th ACM Conference on Computer and Communications Security[C], Washington DC, USA, pp. 190–199. ACM Press, New York (2003)

    Google Scholar 

  13. Internet Threat Detection System Using Bayesian Estimation. In: 16th Annul FIRST Conference on Computer Security Incident Handling. 20 Sumeet Singh, Cristian Estanm (2004)

    Google Scholar 

  14. Wagner, A., Plattner, B.: Entropy based worm and anomaly detection in fast ip networks. In: WET ICE 2005, pp. 172–177 (2005)

    Google Scholar 

  15. Dantu, R., Cangussu, J.W., et al.: Fast worm containment using feedback control. IEEE Transactions On Dependable And Secure Computing 4(2), 119–136 (2007)

    Article  Google Scholar 

  16. Portokalidis, G., Bos, H.: SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Computer Networks 51(5), 1256–1274 (2007)

    Article  MATH  Google Scholar 

  17. Xiao, F., Hu, H., et al.: ASG - Automated signature generation for worm-like P2P traffic patterns. In: waim 2008 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiao, F., Hu, H., Liu, B., Chen, X. (2008). A Novel Worm Detection Model Based on Host Packet Behavior Ranking. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems: OTM 2008. OTM 2008. Lecture Notes in Computer Science, vol 5332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88873-4_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88873-4_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88872-7

  • Online ISBN: 978-3-540-88873-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics