2007
DOI: 10.1177/0037549707080753
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts

Abstract: Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the advantages of the original SWORD: it does not rely on inspecting traffic payloads to search for worm byte patterns or set… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In the related works, we mention that enabling a detection algorithm to execute in real-time usually exploits sliding windows [4,17]. The Accumulation Algorithm is able to promptly obtain the detection results and thus provides an ameliorate condition for online tracing.…”
Section: Online Accumulation Algorithmmentioning
confidence: 99%
“…In the related works, we mention that enabling a detection algorithm to execute in real-time usually exploits sliding windows [4,17]. The Accumulation Algorithm is able to promptly obtain the detection results and thus provides an ameliorate condition for online tracing.…”
Section: Online Accumulation Algorithmmentioning
confidence: 99%
“…Hence, collaboration through gossips provided a way to remedy this by allowing multiple detectors share information to provide better coverage. In [65] the SWORD (Self-propagating Worm Observation and Rapid Detection) detection system was proposed to detect zero-day worms of different propagation types and speeds. This was achieved by determining whether total number of outgoing worm-like connections from a domain during a sliding window crosses a threshold set based on observation of normal traffic.…”
Section: Slow Worm Detectionmentioning
confidence: 99%
“…We emulated slow worms with scanning rates of 5 hosts per minute (h/m) and lOh/m for our experiments. Slow worm rates and thresholds in the order of this magnitude have been used in previous works[65] [22]. Fast worms were emulated with scanning rates of 15 hosts per second (h/s) and 20h/s.…”
mentioning
confidence: 99%