DocumentCode :
1924692
Title :
Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets
Author :
Tatara, Kohei ; Hori, Yoshiaki ; Sakurai, Kouichi
Author_Institution :
Grad. Sch. of Inf. Sci. & Electr. Eng., Kyushu Univ., Kyushu
fYear :
2009
fDate :
16-19 March 2009
Firstpage :
972
Lastpage :
977
Abstract :
Intrusion detection system records worm´s signature, and detects the attack that lurks in traffic based on it. However, to detect the worm that corrects, and changes some oneself, a highly accurate detection technique for distinguishing the code that seems to be the worm included in traffic is requested. In this paper, we pay attention to the Toth et al.´s method to extract the executable code included in the data flows on the network and detect the attack by measuring the length of them. Then, we describe the problem of their method and how to solve it.
Keywords :
computer networks; invasive software; telecommunication security; telecommunication traffic; data flow; intrusion detection system; maximum instruction sequence length; network packet; network traffic; polymorphic worm detection; worm signature; Availability; Cryptography; Electrostatic precipitators; Engines; Information analysis; Information science; Information security; Length measurement; Payloads; Proposals; Abstract Payload Execution; Instrusion Detection; Polymorphic Worm;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security, 2009. ARES '09. International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-3572-2
Electronic_ISBN :
978-0-7695-3564-7
Type :
conf
DOI :
10.1109/ARES.2009.103
Filename :
5066596
Link To Document :
بازگشت