作者: Chirag S. Thaker , Reshma R. Patel
DOI:
关键词: Computer network 、 Computer security 、 Malware 、 Honeypot 、 Longest common substring problem 、 Firewall (construction) 、 Intrusion detection system 、 Network packet 、 Substring 、 Computer science 、 Zero-day attack
摘要: Self-propagating malware, such as worms, have prompted cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities which present threats to networks . A new generation worm could infect millions of hosts in just a few minutes, making on time human intrusion impossible. The worms are spread over the network basis and growing enormously. Here we also facing problem automatically reliably detecting previously unknown known zero-day attack.In this paper, I described use Honeypot detect Zeroday attack network. This paper addresses attacks, generating solutions can prevent infections their early stages. method generate signatures using proposed detection system is presented. detected scanned through system. Honeycomb host-based creates signatures. It uses honeypot capture malicious traffic targeting dark space, then applies Longest Common Substring (LCS) algorithm packet content number connections going same services. computed substring used candidate signature. well suited for extracting string automated updates firewall.