DocumentCode :
2529619
Title :
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Author :
Xie, Mengjun ; Wu, Zhenyu ; Wang, Haining
Author_Institution :
Coll. of William & Mary, Williamsburg
fYear :
2007
fDate :
10-14 Dec. 2007
Firstpage :
64
Lastpage :
73
Abstract :
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to find and hit the next victim by exploiting the current victim´s contact list and playing social engineering tricks. Thus, the spread of IM malware is much harder to detect and suppress through conventional approaches. The previous solutions are ineffective to defend against IM malware in an enterprise-like network environment, mainly because of high false positive rate and the requirement of the IM server being inside the protected network. In this paper, we propose a novel IM malware detection and suppression mechanism, HoneyIM, which guarantees almost zero false positive on detecting and blocking IM malware in an enterprise-like network. The detection of HoneyIM is based on the concept of honeypot. HoneyIM uses decoy accounts to trap IM malware by leveraging malware spreading characteristics. Fed with accurate detection results, the suppression of HoneyIM can conduct a network-wide blocking. In addition, HoneyIM delivers attack information to network administrators in real-time so that system quarantine and recovery can be quickly performed. The core design of HoneyIM is generic, and can be applied to the scenarios that either enterprise IM services or public IM services are used in the protected network. Based on open-source IM client Pidgin and client honeypot Capture, we build a prototype of HoneyIM and validate its efficacy through both simulations and real experiments. Our results show that HoneyIM provides effective protection against IM malware in enterprise-like networks.
Keywords :
computer networks; electronic messaging; invasive software; enterprise instant messaging service; enterprise-like network environment; honeypot; instant messaging malware suppression; malware detection; public instant messaging service; zero false positive; Application software; Computer security; Educational institutions; Employment; Network servers; Open source software; Protection; Prototypes; Real time systems; Uniform resource locators;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual
Conference_Location :
Miami Beach, FL
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3060-4
Type :
conf
DOI :
10.1109/ACSAC.2007.24
Filename :
4412977
Link To Document :
بازگشت