Citations
570 | How to 0wn the Internet in Your Spare Time - Staniford, Paxson, et al. - 2002 |
361 | B.Karp “ Autograph: toward automated, distributed worm signature detection
- Kim
- 2004
(Show Context)
Citation Context ...ries of content signature based detection, Polymorphicssignature based techniques, anomaly based detection andsbehavioral signatures.s3.2 Content-signature techniquessContent-based fingerprinting [7]-=-=[10]-=- is a well-establishedsdimension to capture a worm’s characteristics by deriving thesmost representative content sequence as the worm’s signature.sTable 2 presents some content-based fingerprintingste... |
317 | C.Estan,G.Varghese and S.Savage “Automated Worm fingerprinting
- Singh
(Show Context)
Citation Context ...tegories of content signature based detection, Polymorphicssignature based techniques, anomaly based detection andsbehavioral signatures.s3.2 Content-signature techniquessContent-based fingerprinting =-=[7]-=--[10] is a well-establishedsdimension to capture a worm’s characteristics by deriving thesmost representative content sequence as the worm’s signature.sTable 2 presents some content-based fingerprinti... |
313 | A Taxonomy of Obfuscating Transformations,” - Collberg, Thomborson, et al. - 1997 |
274 | Polygraph: Automatically generating Signatures for Polymorphic worms
- Newsome, Song
- 2005
(Show Context)
Citation Context ...iciouss[9]sN-gramsanalysissPacket Similaritys[10] AutographsPrevalence ofsportions of flowspayloadssCannot detectspolymorphic wormss3.3 Polymorphic-signature generationsschemessA number of techniques =-=[12]-=--[16] have been presented forsdetecting polymorphic worms. Again, the technique used isshighlighted, the worm characteristic leverage is indicated andsthe limitations of the technique are pointed out ... |
175 | A Taxonomy of Computer Worms,”
- Weaver, Paxon, et al.
- 2003
(Show Context)
Citation Context ...cansFig 2: Categorization of Internet Worm CharacteristicssTo further inform the identification of worm characteristicssleveraged by the various detection techniques, the worm lifescycle presented in =-=[6]-=- will be used. It consists of the followingsphases: 1) initialization phase where software is installed, thesconfiguration of the local machine and the instantiation of thesglobal variables and beginn... |
149 | Polymorphic worm detection using structural information of executables,
- Kruegel, Kirda, et al.
- 2005
(Show Context)
Citation Context ...mitationss[12]sPolygraph, Multiple disjointscontent substringssMulti invariant substrings must be presentsin all variants of a payload (substringsscorresponding to protocol framing, returnsaddresses)s=-=[13]-=- Control Flow Graph (CFG) Similarities in network flowssWorms that do not use executable codeswill not be detected; complex analysiss[14]sPosition Aware DistributionsSignaturesGeneric pattern of the s... |
54 | PHAD: Packet header anomaly detection for indentifying hostile network traffic, Florida Tech. technical report CS-2001-4,
- Mahoney, Chan
- 2001
(Show Context)
Citation Context ...d does not include data flow analysis;salso, strictly intra-procedural and doessnot detect malicious behavior splitsacross several proceduress3.4 Behavioral signature techniquessA few techniques [18]-=-=[20]-=- are presented that use behavioralsfoot printing to detect worms. Table 4 below shows thesanalysis of these techniques. Content-based fingerprintingsschemes do not capture a worm’s temporal infection ... |
44 | Worm detection, early warning and response based on local victim information - Gu, Sharif, et al. - 2004 |
44 | Oorschot, “DNS-based detection of scanning worms in an enterprise network - Whyte, Kranakis, et al. - 2005 |
30 |
Code Red: A Case Study on the Spread and Victims of an Internet Worm,”
- Moore, Shannon, et al.
- 2002
(Show Context)
Citation Context ...a slowersrate than worms. Worms on the other hand, spread extremelysfast. During the Code Red I version 1 internet worm attack ofsthe year 2001, over 359,000 computers were infected in unders14 hours =-=[2]-=-. During the more aggressive Slammer internetsworm attack of the year 2003 more than 90% of 75,000svulnerable hosts were infected in less than 10 minutes [3]. Asproperly constructed worm could infect ... |
21 | Detecting Malicious Network Traffic Using Inverse Distribution of Packet Content”,
- Karamcheti, Geiger, et al.
- 2005
(Show Context)
Citation Context ... Content-based fingerprintingstechniquessRef. TechniquesWormsCharacteristicsLeveragedsLimitationss[7]sEarly Bird,sContent SiftingsContentsInvariance;sPacket SimilaritysCannot detectspolymorphic wormss=-=[8]-=-sInversesdistribution ofspacket contentssByte-levelssimilarity ofspacketssSome packets thatsalso exhibit contentlevel similarity aresnot maliciouss[9]sN-gramsanalysissPacket Similaritys[10] Autographs... |
20 |
Worm anatomy and model.
- Ellis
- 2003
(Show Context)
Citation Context ... Trojan horse, Spyware and Adware.sIn this paper, we focus on Worms. A network worm is definedsas a process that can cause a (possibly evolved) copy of it tosexecute on a remote computational machine =-=[1]-=-. Wormssnormally self-propagate across networks by exploitingssecurity or policy flaws in widely-used network services.sWorms are different from Viruses in that Viruses piggy-backson files and therefo... |
15 |
A survey of internet worm detection and containment
- Li, Salour, et al.
(Show Context)
Citation Context ...ion Detection Systems face.sFigure 1 presents the categorization that will be extended tosinclude many other current detection parameters.sFig 1: Categorization of Internet Worm Defense. Adaptedsfrom =-=[5]-=-sThe rest of the paper is organized as follows. Section 2sdiscusses computer worm behavior. Section 3 discussessvarious worm detection techniques, indicating the wormscharacteristics that they leverag... |
14 |
Behavioral Detection of Malware: From a Survey towards an Established Taxonomy
- Jacob, Debar, et al.
- 2008
(Show Context)
Citation Context ...icsand does not include data flow analysis;salso, strictly intra-procedural and doessnot detect malicious behavior splitsacross several proceduress3.4 Behavioral signature techniquessA few techniques =-=[18]-=--[20] are presented that use behavioralsfoot printing to detect worms. Table 4 below shows thesanalysis of these techniques. Content-based fingerprintingsschemes do not capture a worm’s temporal infec... |
10 | Proactive Detection of Computer Worms Using Model Checking.
- Kinder, Katzenbeisser, et al.
- 2010
(Show Context)
Citation Context ...ss[9]sN-gramsanalysissPacket Similaritys[10] AutographsPrevalence ofsportions of flowspayloadssCannot detectspolymorphic wormss3.3 Polymorphic-signature generationsschemessA number of techniques [12]-=-=[16]-=- have been presented forsdetecting polymorphic worms. Again, the technique used isshighlighted, the worm characteristic leverage is indicated andsthe limitations of the technique are pointed out in th... |
9 |
vEye: Behavioral footprinting for self-propagating worm detection and profiling,”
- Jiang, Zhu
- 2009
(Show Context)
Citation Context ...overs the probing, exploitationsand replication phases of the infection session [18].sTable 4.Synthesis of Behavioral foot printing techniquessRef. Technique Worm Characteristic Leveraged Limitationss=-=[17]-=- Model each infection step as a behaviorsphenotype & the entire infection session as assequential behavioral footprintsIntrinsic differences between a normalsaccess to the service and a wormsinfection... |
7 | Effective worm detection for various scan techniques - Xia, Vangala, et al. - 2006 |
6 | Oorschot, “ARP-Based Detection of Scanning Worms within an Enterprise Network”, - Whyte, Kranakis, et al. - 2005 |
6 | Modeling and detection of camouflaging worm - Yu, Wang, et al. - 2011 |
5 | Hitlist worm detection using source ip address history - Chan, Leckie, et al. - 2006 |
4 |
An automated signaturebased approach against polymorphic internet worms
- Tang, Chen
- 2007
(Show Context)
Citation Context ...ubstringsscorresponding to protocol framing, returnsaddresses)s[13] Control Flow Graph (CFG) Similarities in network flowssWorms that do not use executable codeswill not be detected; complex analysiss=-=[14]-=-sPosition Aware DistributionsSignaturesGeneric pattern of the signature whilesallowing local variation in specificspositionssA worm may include a commonssegment that appears in normal traffic;salso, a... |
3 | Thwarting zero-day polymorphic worms with networklevel length-based signature generation
- Wang, Li, et al.
- 2010
(Show Context)
Citation Context ...ilesallowing local variation in specificspositionssA worm may include a commonssegment that appears in normal traffic;salso, a worm may have multiplescharacteristics that all carry usefulsinformations=-=[15]-=-sLength-based signatures to targetsbuffer overflow attackssTo exploit any buffer overflowsvulnerability, the length of certain protocolsfields must be long enough to overflow thesbuffersOnly effective... |
3 | SWORD: Selfpropagating worm observation and rapid detection
- Li, Stafford, et al.
- 2006
(Show Context)
Citation Context ...d a wormsinfection through the servicesWeak against behaviorsubstitution attacks andsbehavior camouflaging attackss[18] Malware behavior constructed from itssexecution tracesMalware behavior distincts=-=[19]-=- SWORD framework Causal similarity; destination addresssdistribution; continuity analysissDoes not detect slow moving orssmart worms; false positive forsworm-like legitimate traffic;sneeds training ag... |
1 |
learns the normal range of values for each packet header field Rare values for the packet header field values Does not examine application layer protocols; prone to attacks on training data
- PHAD-
(Show Context)
Citation Context ...d does not include data flow analysis;salso, strictly intra-procedural and doessnot detect malicious behavior splitsacross several proceduress3.4 Behavioral signature techniquessA few techniques [18]-=-=[20]-=- are presented that use behavioralsfoot printing to detect worms. Table 4 below shows thesanalysis of these techniques. Content-based fingerprintingsschemes do not capture a worm’s temporal infection ... |
1 | Anomalous ARP activity within a network cell; Relies only on ARP activity; does not correlate ARP requests and replies - ARP |
1 | based approach Random scanning techniques used by worms induce a large number of packets to inactive addresses or inactive services False positives during DDoS attacks - Number |
1 | Relation Traffic with high rates of ICMP type 3 & TCP RST packets- evidence of scanning - Cross |
1 | Statistical cross-relation approach for detecting TCP and UDP random and sequential network scanning (SCANS - Anbar, Manasrah, et al. |