DocumentCode
796690
Title
How to hook worms [computer network security]
Author
Riordan, James ; Wespi, Andreas ; Zamboni, Diego
Author_Institution
IBM Zurich Res. Lab., Switzerland
Volume
42
Issue
5
fYear
2005
fDate
5/1/2005 12:00:00 AM
Firstpage
32
Lastpage
36
Abstract
This paper discusses the use of intrusion detection systems to protect against the various threats faced by computer systems by way of worms, viruses and other forms of attacks. Intrusion detection systems attempt to detect things that are wrong in a computer network or system. The main problems of these systems, however, are the many false alarms they produce, their lack of resistance to both malicious attacks and accidental failures, and the constant appearance of new attacks and vulnerabilities. IBM Zurich Research Laboratory has developed a system that specifically targets worms rather than trying to prevent all breaches of computer security. Called Billy Goat, the specialized worm detection system runs on a dedicated machine connected to the network and detects worm-infected machines anywhere in it. Billy Goat has been proven effective at detecting worm-infected machines in a network. It is currently used in several large corporate intranets, and it is normally able to detect infected machines within seconds of their becoming infected. Furthermore, not only is it able to detect the presence of a worm in the network, it can even provide the addresses of the infected machines. This makes it considerably easier to remedy the problem.
Keywords
Internet; invasive software; telecommunication security; Billy Goat intrusion-detection system; Internet worm; computer network; computer virus; distributed architecture; worm alarms; worm-infected machines; Computer networks; Computer security; Computer viruses; Computer worms; Face detection; Intrusion detection; Laboratories; Protection;
fLanguage
English
Journal_Title
Spectrum, IEEE
Publisher
ieee
ISSN
0018-9235
Type
jour
DOI
10.1109/MSPEC.2005.1426967
Filename
1426967
Link To Document