UM
Residential Collegefalse
Status已發表Published
Modeling and detection of Camouflaging Worm
Yu W.; Wang X.; Calyam P.; Xuan D.; Zhao W.
2011
Source PublicationIEEE Transactions on Dependable and Secure Computing
ISSN15455971
Volume8Issue:3Pages:377
Abstract

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. We analyze characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and nonworm traffic (background traffic). We observe that these two types of traffic are barely distinguishable in the time domain. However, their distinction is clear in the frequency domain, due to the recurring manipulative nature of the C-Worm. Motivated by our observations, we design a novel spectrum-based scheme to detect the C-Worm. Our scheme uses the Power Spectral Density (PSD) distribution of the scan traffic volume and its corresponding Spectral Flatness Measure (SFM) to distinguish the C-Worm traffic from background traffic. Using a comprehensive set of detection metrics and real-world traces as background traffic, we conduct extensive performance evaluations on our proposed spectrum-based detection scheme. The performance data clearly demonstrates that our scheme can effectively detect the C-Worm propagation. Furthermore, we show the generality of our spectrum-based scheme in effectively detecting not only the C-Worm, but traditional worms as well. © 2011 IEEE.

KeywordAnomaly Detection Camouflage Worm
DOI10.1109/TDSC.2010.13
URLView the original
Language英語English
WOS IDWOS:000288453700004
The Source to ArticleScopus
Scopus ID2-s2.0-79952954563
Fulltext Access
Citation statistics
Document TypeJournal article
CollectionUniversity of Macau
Recommended Citation
GB/T 7714
Yu W.,Wang X.,Calyam P.,et al. Modeling and detection of Camouflaging Worm[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(3), 377.
APA Yu W.., Wang X.., Calyam P.., Xuan D.., & Zhao W. (2011). Modeling and detection of Camouflaging Worm. IEEE Transactions on Dependable and Secure Computing, 8(3), 377.
MLA Yu W.,et al."Modeling and detection of Camouflaging Worm".IEEE Transactions on Dependable and Secure Computing 8.3(2011):377.
Files in This Item:
There are no files associated with this item.
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Yu W.]'s Articles
[Wang X.]'s Articles
[Calyam P.]'s Articles
Baidu academic
Similar articles in Baidu academic
[Yu W.]'s Articles
[Wang X.]'s Articles
[Calyam P.]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Yu W.]'s Articles
[Wang X.]'s Articles
[Calyam P.]'s Articles
Terms of Use
No data!
Social Bookmark/Share
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.