首页> 外文会议> >Detecting intra-enterprise scanning worms based on address resolution
【24h】

Detecting intra-enterprise scanning worms based on address resolution

机译:根据地址解析检测企业内部扫描蠕虫

获取原文

摘要

Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of some form of human involvement to formulate updated attack signatures. We propose an anomaly-based detection technique detailing a method to detect propagation of scanning worms within individual network cells, thus protecting internal networks from infection by internal clients. Our software implementation indicates that this technique is both accurate and rapid enough to enable automatic containment and suppression of worm propagation within a network cell. Our approach relies on an aggregate anomaly score, derived from the correlation of address resolution protocol (ARP) activity from individual network attached devices. Our preliminary analysis and prototype indicate that this technique can be used to rapidly detect zero-day worms within a very small number of scans.
机译:用于检测Internet蠕虫的基于签名的方案通常在零时差蠕虫上失败,并且它们对新威胁迅速做出反应的能力通常受到某种形式的人工干预来制定更新的攻击签名的要求所限制。我们提出了一种基于异常的检测技术,详细介绍了一种方法来检测单个网络单元中扫描蠕虫的传播,从而保护内部网络免受内部客户端的感染。我们的软件实现表明,该技术既准确又快速,足以实现对网络单元内蠕虫传播的自动遏制和抑制。我们的方法依赖于汇总异常评分,该评分源自各个网络连接设备的地址解析协议(ARP)活动的相关性。我们的初步分析和原型表明,该技术可用于在很少的扫描范围内快速检测零日蠕虫。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号