Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm

作者: Al-Sakib Khan Pathan , Mohssen M. Z. E. Mohammed , Malak Abdullah I. Almarshad

DOI:

关键词:

摘要: Zero-day polymorphic worms pose a serious threat to the security of Mobile systems and Internet infrastructure. In many cases, it is difficult detect worm attacks at an early stage. There typically little or no time develop well-constructed solution during such outbreak. This because act only spread from node they bring concerns everyone using via any static mobile node. No system safe aggressive crisis. However, characteristics can be used defeat it, including its predictable behavior shared signatures. this paper, we propose efficient signature generation method based on string similarity algorithms generate signatures for worms. Then, these are practically applied Intrusion Detection System (IDS) prevent network attacks. The experimental results show efficiency proposed approach compared other existing mechanisms.

参考文章(20)
Mohssen Mohammed, Al-Sakib Khan Pathan, None, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks ,(2013)
Ratinder Kaur, Maninder Singh, Efficient hybrid technique for detecting zero-day polymorphic worms ieee international advance computing conference. pp. 95- 100 ,(2014) , 10.1109/IADCC.2014.6779301
H. Orman, The Morris worm: a fifteen-year perspective ieee symposium on security and privacy. ,vol. 1, pp. 35- 43 ,(2003) , 10.1109/MSECP.2003.1236233
Chuitian Rong, Wei Lu, Xiaoli Wang, Xiaoyong Du, Yueguo Chen, Anthony K.H. Tung, Efficient and Scalable Processing of String Similarity Join IEEE Transactions on Knowledge and Data Engineering. ,vol. 25, pp. 2217- 2230 ,(2013) , 10.1109/TKDE.2012.195
M. Bailey, E. Cooke, F. Jahanian, D. Watson, J. Nazario, The Blaster worm: then and now ieee symposium on security and privacy. ,vol. 3, pp. 26- 31 ,(2005) , 10.1109/MSP.2005.106
Pele Li, Mehdi Salour, Xiao Su, A survey of internet worm detection and containment IEEE Communications Surveys and Tutorials. ,vol. 10, pp. 20- 35 ,(2008) , 10.1109/COMST.2008.4483668
Lanjia Wang, Zhichun Li, Yan Chen, Zhi Fu, Xing Li, Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation IEEE/ACM Transactions on Networking. ,vol. 18, pp. 53- 66 ,(2010) , 10.1109/TNET.2009.2020431
J. Newsome, B. Karp, D. Song, Polygraph: automatically generating signatures for polymorphic worms ieee symposium on security and privacy. pp. 226- 241 ,(2005) , 10.1109/SP.2005.15