【24h】

Rapid Detection of Worms Using ICMP-T3 Analysis

机译:使用ICMP-T3分析快速检测蠕虫

获取原文
获取原文并翻译 | 示例

摘要

Identification of an active Internet worm is a manual process where security analysts must observe and analyze unusual activity on multiple firewalls, intrusion-detection systems or hosts. A worm might not be positively identified until it already has spread to most of the Internet, eliminating many defensive options. In previous work, we developed an automated system that can identify active worms seconds or minutes after they first begin to spread, a necessary precursor to halting the spread of the worm rather than simply cleaning up afterward. The system collects ICMP Destination Unreachable messages from instrumented network routers, identifies those patterns of unreachable messages that indicate malicious scanning activity, and then searches for patterns of scanning activity that indicate a propagating worm. In this paper, we compare the performance of two different detection strategies, our previous threshold approach and a new line-fit approach, for different worm-propagation techniques, noise environments, and system parameters. These techniques work for worms that generate at least some of their target addresses through a random process, a feature of most recent worms. Although both being powerful methods for fast worm identification, the new line-fit approach proves to be significantly more noise resistant.
机译:识别活动的Internet蠕虫是一个手动过程,安全分析人员必须观察并分析多个防火墙,入侵检测系统或主机上的异常活动。在蠕虫已经传播到大多数Internet之前,它可能无法得到肯定的识别,从而消除了许多防御措施。在以前的工作中,我们开发了一个自动化系统,该系统可以在活动蠕虫首次开始传播后的几秒钟或几分钟内进行识别,这是阻止蠕虫传播而不是随后进行清除的必要先兆。系统从检测到的网络路由器收集“ ICMP目标不可达”消息,识别表明恶意扫描活动的不可达消息的那些模式,然后搜索指示蠕虫传播的扫描活动的模式。在本文中,我们针对不同的蠕虫传播技术,噪声环境和系统参数,比较了两种不同的检测策略(我们以前的阈值方法和新的线拟合方法)的性能。这些技术适用于蠕虫,这些蠕虫通过随机过程生成了至少一些目标地址,这是最新蠕虫的功能。尽管这两种方法都是用于快速蠕虫识别的强大方法,但新的“线拟合”方法被证明具有更高的抗噪能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号