A Survey on Zero-Day Polymorphic Worm Detection Techniques

作者: Ratinder Kaur , Maninder Singh

DOI: 10.1109/SURV.2014.022714.00160

关键词:

摘要: Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not only can they exploit unknown vulnerabilities but can also change their own representations on each new infection or can encrypt their payloads using a different key per infection. They have many variations in the signatures of the same worm thus, making their fingerprinting very difficult. Therefore, signature-based defenses and traditional security layers miss these …

参考文章(105)
Srikanth Kandula, Yuanyuan Zhou, Sudarshan M. Srinivasan, Christopher R. Andrews, Flashback: a lightweight extension for rollback and deterministic replay for software debugging usenix annual technical conference. pp. 3- 3 ,(2004)
Brad Karp, Hyang-Ah Kim, Autograph: toward automated, distributed worm signature detection usenix security symposium. pp. 19- 19 ,(2004)
Mamoun Alazab, Sitalakshmi Venkatraman, Paul A Watters, Moutaz Alazab, None, Zero-day malware detection based on supervised learning algorithms of API call signatures australasian data mining conference. pp. 171- 182 ,(2011)
Yangseo Choi, Koohong Kang, Ikkyun Kim, Jintae Oh, Daewon Kim, Jongsoo Jang, Validation Methods of Suspicious Network Flows for Unknown Attack Detection ,(2009)
Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon, A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System Advances in Databases: Concepts, Systems and Applications. pp. 140- 151 ,(2007) , 10.1007/978-3-540-71703-4_14
Thomas Toth, Christopher Kruegel, Accurate buffer overflow detection via abstract payload execution recent advances in intrusion detection. pp. 274- 291 ,(2002) , 10.1007/3-540-36084-0_15
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan, A survey of intrusion detection techniques in Cloud Journal of Network and Computer Applications. ,vol. 36, pp. 42- 57 ,(2013) , 10.1016/J.JNCA.2012.05.003
Oleg Kolesnikov, Wenke Lee, Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic Georgia Institute of Technology. ,(2005)
Nicholas Nethercote, Julian Seward, Valgrind: A Program Supervision Framework Electronic Notes in Theoretical Computer Science. ,vol. 89, pp. 44- 66 ,(2003) , 10.1016/S1571-0661(04)81042-9