Results 1 - 10
of
4,986
IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation 1
"... Abstract — In recent era, Internet worms are one of serious threats which have been a major cause of intrusion attempts. Traditional Intrusion Detection Systems (IDS) store all known worm signatures and monitors real time traffic to find out these signatures and prevent possible intrusion attempts. ..."
Abstract
- Add to MetaCart
. This approach is not useful for newly evolved worms due to the unavailability of their signatures. Present worm signature generation work needs manual analysis which is time consuming process. To circumvent these problems substantial efforts have been made which automate the process of worm signature generation
Misleading worm signature generators using deliberate noise injection
- In Proceedings of the 2006 IEEE Symposium on Security and Privacy
, 2006
"... Several syntactic-based automatic worm signature generators, e.g., Polygraph, have recently been proposed. These systems typically assume that a set of suspicious flows are provided by a flow classifier, e.g., a honeynet or an intrusion detection system, that often introduces “noise ” due to difficu ..."
Abstract
-
Cited by 56 (2 self)
- Add to MetaCart
Several syntactic-based automatic worm signature generators, e.g., Polygraph, have recently been proposed. These systems typically assume that a set of suspicious flows are provided by a flow classifier, e.g., a honeynet or an intrusion detection system, that often introduces “noise ” due
Wormshield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
- IEEE Transaction on Dependable and Secure Computing (TDSC), submitted December 2005 and revised
, 2006
"... Fast and accurate generation of worm signatures is essential to contain zero-day worms at the Internet scale. Recent work has shown that signature generation can be automated by analyzing the repetition of worm substrings (i.e., fingerprints) and their address dispersion. However, at the early stage ..."
Abstract
-
Cited by 7 (3 self)
- Add to MetaCart
Fast and accurate generation of worm signatures is essential to contain zero-day worms at the Internet scale. Recent work has shown that signature generation can be automated by analyzing the repetition of worm substrings (i.e., fingerprints) and their address dispersion. However, at the early
Comparison of Three Sliding-Window Based Worm Signature Generation Schemes
"... Abstract--Network worms are a growing threat to today’s Internet-connected networks and hosts. Modern worms can spread very quickly and widely so automatic response is required to contain worm outbreaks. In this paper, we propose a system that can automatically generate useful signatures that can be ..."
Abstract
- Add to MetaCart
Abstract--Network worms are a growing threat to today’s Internet-connected networks and hosts. Modern worms can spread very quickly and widely so automatic response is required to contain worm outbreaks. In this paper, we propose a system that can automatically generate useful signatures that can
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
- In Network and Distributed Systems Security Symposium
, 2005
"... Software vulnerabilities have had a devastating effect on the Internet. Worms such as CodeRed and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage [32, 51]. To successfully combat these fast automatic Internet attacks, we nee ..."
Abstract
-
Cited by 647 (32 self)
- Add to MetaCart
be used as signatures. Semantic-analysis based signature generation can be more accurate, resilient against polymorphic worms, and robust to attacks exploiting polymorphism than the pattern-extraction based signature generation methods.
Autograph: Toward automated, distributed worm signature detection
- In Proceedings of the 13th Usenix Security Symposium
, 2004
"... Today’s Internet intrusion detection systems (IDSes) monitor edge networks ’ DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its local edge network from compromise and denial of service, it cannot alone effectively intervene to halt and reverse the spreading o ..."
Abstract
-
Cited by 362 (3 self)
- Add to MetaCart
of novel Internet worms. Generation of the worm signatures required by an IDS—the byte patterns sought in monitored traffic to identify worms—today entails non-trivial human labor, and thus significant delay: as network operators detect anomalous behavior, they communicate with one another and manually
Polygraph: Automatically generating signatures for polymorphic worms
- In Proceedings of the IEEE Symposium on Security and Privacy
, 2005
"... It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match poly ..."
Abstract
-
Cited by 275 (17 self)
- Add to MetaCart
It is widely believed that content-signature-based intrusion detection systems (IDSes) are easily evaded by polymorphic worms, which vary their payload on every infection attempt. In this paper, we present Polygraph, a signature generation system that successfully produces signatures that match
Automated worm fingerprinting
- In OSDI
, 2004
"... Network worms are a clear and growing threat to the security of today’s Internet-connected hosts and networks. The combination of the Internet’s unrestricted connectivity and widespread software homogeneity allows network pathogens to exploit tremendous parallelism in their propagation. In fact, mod ..."
Abstract
-
Cited by 317 (9 self)
- Add to MetaCart
with a range of unique sources generating infections and destinations being targeted. More importantly, our approach – called “content sifting ” – automatically generates precise signatures that can then be used to filter or moderate the spread of the worm elsewhere in the network. Using a combination
Gene selection for cancer classification using support vector machines
- Machine Learning
"... Abstract. DNA micro-arrays now permit scientists to screen thousands of genes simultaneously and determine whether those genes are active, hyperactive or silent in normal or cancerous tissue. Because these new micro-array devices generate bewildering amounts of raw data, new analytical methods must ..."
Abstract
-
Cited by 1115 (24 self)
- Add to MetaCart
Abstract. DNA micro-arrays now permit scientists to screen thousands of genes simultaneously and determine whether those genes are active, hyperactive or silent in normal or cancerous tissue. Because these new micro-array devices generate bewildering amounts of raw data, new analytical methods must
Short Signatures without Random Oracles
, 2004
"... We describe a short signature scheme which is existentially unforgeable under a chosen message attack without using random oracles. The security of our scheme depends on a new complexity assumption we call the Strong Di#e-Hellman assumption. This assumption has similar properties to the Strong RS ..."
Abstract
-
Cited by 393 (11 self)
- Add to MetaCart
RSA assumption, hence the name. Strong RSA was previously used to construct signature schemes without random oracles. However, signatures generated by our scheme are much shorter and simpler than signatures from schemes based on Strong RSA.
Results 1 - 10
of
4,986