首页> 外文学位 >Behavior-based worm detection.
【24h】

Behavior-based worm detection.

机译:基于行为的蠕虫检测。

获取原文
获取原文并翻译 | 示例

摘要

The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including network worms, bot-nets, viruses, etc. Detecting such attacks is a critical component of defending against them. This dissertation focuses on detecting and understanding self-propagating network worms, a type of malware with a proven record of disrupting the Internet. According to Computer Economics , the Code-Red worm caused more than 2.5 billion dollars in damages, and it was an unsophisticated worm that hit nearly 10 years ago when the Internet was less important than it is now. The recent StuxNet worm is a tremendously more sophisticated worm than Code-Red, and had it been targeted at disrupting the Internet it seems a near certainty that it could have caused significantly more damage than Code-Red. For this reason it is supremely important that we focus on detecting and stopping worms. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is best. New worms such as IKEE.B (also known as the iPhone worm) present new challenges to worm detection, raising the question of how effective our worm defenses are.;This dissertation studies the detection of self-propagating network worms with the goal of improving our ability to detect slowly propagating "stealthy" worms. We make the following contributions to the field: (i) we introduce a worm-detector evaluation framework that allows us to easily evaluate a detector's performance across a variety of environments and worm types; (ii) we use this evaluation environment to compare existing worm detectors to determine their strengths and weaknesses; (iii) we examine evasive worms that attempt to avoid detection, measuring how effective they are at remaining undetected and the propagation rate they are able to achieve while doing so; and (iv) we introduce a new worm detector, SWORD2, which provides superior performance at detecting stealthy or evasive worms.;This dissertation includes previously published co-authored material.
机译:互联网已经成为我们生活和企业的核心组成部分。它的可靠性和可用性至关重要。有许多类型的恶意软件会影响Internet的可用性,包括网络蠕虫,僵尸网络,病毒等。检测到此类攻击是防御它们的关键组成部分。本文着重于检测和理解自我传播的网络蠕虫,这是一种具有被证明破坏互联网的记录的恶意软件。根据计算机经济学,红色代码蠕虫病毒造成的损失超过25亿美元,这是一种不老练的蠕虫病毒,它在近十年前流行,当时互联网的重要性不如现在。最近的StuxNet蠕虫比Code-Red蠕虫病毒要复杂得多,并且如果以破坏互联网为目标,那么几乎可以肯定的是,它可能比Code-Red造成更大的破坏。因此,我们必须专注于检测和阻止蠕虫,这一点至关重要。已经提出并部署了许多蠕虫检测器,但是文献并未明确指出哪一种是最佳的。诸如IKEE.B之类的新型蠕虫(也称为iPhone蠕虫)对蠕虫检测提出了新的挑战,提出了我们的蠕虫防御系统的有效性问题。我们检测缓慢传播的“隐身”蠕虫的能力。我们在该领域做出了以下贡献:(i)我们引入了一种蠕虫检测器评估框架,该框架使我们能够轻松评估各种环境和蠕虫类型下检测器的性能; (ii)我们使用这种评估环境来比较现有的蠕虫检测器,以确定其优势和劣势; (iii)我们检查试图避免被发现的规避蠕虫,测量它们在未被发现的情况下的有效性以及在这样做时能够实现的传播速度; (iv)我们引入了一种新的蠕虫检测器SWORD2,该蠕虫检测器在检测隐形或逃避蠕虫方面具有出色的性能。本论文包括以前发表的合著材料。

著录项

  • 作者

    Stafford, John Shadrach.;

  • 作者单位

    University of Oregon.;

  • 授予单位 University of Oregon.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 218 p.
  • 总页数 218
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号