首页> 外文会议>IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprises >Host behaviour based early detection of worm outbreaks in Internet backbones
【24h】

Host behaviour based early detection of worm outbreaks in Internet backbones

机译:基于互联网骨干蠕虫爆发的宿主行为

获取原文

摘要

We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual hosts like ratio of outgoing to incoming traffic, responsiveness and number of connections. These properties are used to group hosts into distinct behaviour classes. We use flow-level (Cisco Net Flow) information exported by the border routers of a Swiss Internet backbone provider (AS559/SWITCH). By tracking the cardinality of each class over time and alarming on fast increases and other significant changes, we can early and reliably detect worm outbreaks. We successfully validated our method with archived flow-level traces of recent major Internet e-mail based worms such as MyDoomA and Sobig.F, and fast spreading network worms like Witty and Blaster. Our method is generic in the sense that it does not require any previous knowledge about the exploits and scanning method used by the worms. It can give a set of suspicious hosts in near real-time that have recently and drastically changed their network behaviour and hence are highly likely to be infected.
机译:我们提出了一种关于高速互联网骨架中早期检测蠕虫爆发的新型实时方法。我们的方法将多个行为属性属性属于传票与传入流量,响应性和连接数的比率。这些属性用于将主机分为不同的行为类。我们使用由瑞士互联网骨干提供商(AS559 /交换机)的边界路由器导出的流程级(Cisco Net Flow)信息。通过随着时间的推移跟踪每个课程的基数,并在快速增加和其他重大变化的情况下,我们可以提前且可靠地检测蠕虫爆发。我们成功验证了近期主要互联网电子邮件基于蠕虫的存档流量级别的方法,如MyDooma和Sobig.f,以及像诙谐和闪烁的快速传播网络蠕虫。我们的方法是通用的,因为它不需要任何关于蠕虫使用的漏洞利用和扫描方法的任何知识。它可以在最近的实时提供一套可疑主机,最近并且彻底改变了他们的网络行为,因此很可能被感染。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号