2007 IEEE International Conference on Network Protocols 2007
DOI: 10.1109/icnp.2007.4375847
|View full text |Cite
|
Sign up to set email alerts
|

Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms

Abstract: Abstract-It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at their early phase. However, most existing network-based signatures generated are not vulnerability-based and can be easily evaded by attacks. In this paper, we propose generating vulnerability-based signatures on the network level without any host-level analysis of worm execution or vulnerable programs. As the first step, we design… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…LESG is the only network-based system that relies on these vulnerabilities [9]. It relies on parsing the protocol to extract the fields and find the maximum field lengths that make the application vulnerable to a buffer overflow attack.…”
Section: B Related Workmentioning
confidence: 99%
“…LESG is the only network-based system that relies on these vulnerabilities [9]. It relies on parsing the protocol to extract the fields and find the maximum field lengths that make the application vulnerable to a buffer overflow attack.…”
Section: B Related Workmentioning
confidence: 99%
“…M-Grams parameter presets threshold for minimum length of signature. After reviewing the literature [22], [23], [24] and according to our experiments on Witty worm, the M-Grams value is set to 2 n (where 5 d n d 10), which means the signature length is between 32-1024 bytes.…”
Section: Subroutinementioning
confidence: 99%
“…Li et al [19] proposed Hamsa, a noise-tolerant and attackresilient network-based automated signature generation system for polymorphic worms. Approaches to generate vulnerabilitybased signatures [5], [20] were also proposed on the network level without any host-level analysis of execution. However, Chung et al [9] showed that all of these signature generation schemes are vulnerable to advanced allergy attacks.…”
Section: Related Workmentioning
confidence: 99%