Detecting Intra-enterprise Scanning Worms based on Address Resolution

ACSAC(2005)

引用 21|浏览2
暂无评分
摘要
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of some form of human involvement to formulate updated attack signatures. We propose an anomaly-based detection technique detailing a method to detect propagation of scanning worms within individual network cells, thus protecting internal networks from infection by internal clients. Our software implementation indicates that this technique is both accurate and rapid enough to enable automatic containment and suppression of worm propagation within a network cell. Our approach relies on an aggregate anomaly score, derived from the correlation of Address Resolution Protocol (ARP) activity from individual network attached devices. Our preliminary analysis and prototype indicate that this technique can be used to rapidly detect zero-day worms within a very small number of scans.
更多
查看译文
关键词
address resolution protocol,individual network,worm propagation,network cell,individual network cell,detecting intra-enterprise scanning,anomaly-based detection technique,zero-day worm,internet worm,internal client,internal network,internet
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要