An automatic, prompt, and accurate exploit-based method to generate polymorphic worm's signature

Sureswaran Ramadass*, Shubair A. Abdulla, Altyeb Altaher Altyeb

*المؤلف المقابل لهذا العمل

نتاج البحث: Conference contribution

1 اقتباس (Scopus)

ملخص

Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all encrypted payloads share the same invariant exploit code to ensure exploiting same vulnerability in same manner on all victims. This research paper is an endeavor to interpret the invariant part into signature. The basic idea of the proposed method is to assemble attacking payloads on a honeypot, and then extracting the worm's signature by using a matching technique. The experiments were conducted on two datasets, Witty worm's payloads and synthetic payloads, and have demonstrated promising results.

اللغة الأصليةEnglish
عنوان منشور المضيفProceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011
الصفحات37-41
عدد الصفحات5
المعرِّفات الرقمية للأشياء
حالة النشرPublished - 2011
منشور خارجيًانعم
الحدث2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011 - Shenzhen, China
المدة: أكتوبر ٢٨ ٢٠١١أكتوبر ٣٠ ٢٠١١

سلسلة المنشورات

الاسمProceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011

Conference

Conference2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011
الدولة/الإقليمChina
المدينةShenzhen
المدة١٠/٢٨/١١١٠/٣٠/١١

ASJC Scopus subject areas

  • ???subjectarea.asjc.1700.1705???

قم بذكر هذا