{"title":"Designing a framework for active worm detection on global networks","authors":"V. Berk, G. Bakos, R. Morris","doi":"10.1109/IWIAS.2003.1192455","DOIUrl":null,"url":null,"abstract":"Past active Internet worms have caused widespread damage. Knowing the connection characteristics of such a worm very early in its proliferation cycle might provide first responders with an opportunity to intercept a global scale epidemic. We are presenting a scalable framework for detecting, in near-real-time, active Internet worms on global networks, both public and private. By aggregating network error messages resulting from failed attempts at packet delivery, we are able to infer deviant connection behavior of hosts on interconnected networks. The Internet Control Message Protocol (ICMP) provides such error notification. Using a potentially unlimited number of collectors and analyzers, we identify 'blooms' of activity. The connection characteristics of these 'blooms' are then correlated to identify worm-like behavior, and an alert is raised. Promising results have been produced with a simulated Internet worm, demonstrating that new worms can be detected within the first few minutes after release, depending on the level of participating router coverage.","PeriodicalId":186507,"journal":{"name":"First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.","volume":"337 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"80","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWIAS.2003.1192455","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 80
Abstract
Past active Internet worms have caused widespread damage. Knowing the connection characteristics of such a worm very early in its proliferation cycle might provide first responders with an opportunity to intercept a global scale epidemic. We are presenting a scalable framework for detecting, in near-real-time, active Internet worms on global networks, both public and private. By aggregating network error messages resulting from failed attempts at packet delivery, we are able to infer deviant connection behavior of hosts on interconnected networks. The Internet Control Message Protocol (ICMP) provides such error notification. Using a potentially unlimited number of collectors and analyzers, we identify 'blooms' of activity. The connection characteristics of these 'blooms' are then correlated to identify worm-like behavior, and an alert is raised. Promising results have been produced with a simulated Internet worm, demonstrating that new worms can be detected within the first few minutes after release, depending on the level of participating router coverage.
过去活跃的互联网蠕虫造成了广泛的破坏。在这种蠕虫扩散周期的早期就知道它的连接特征,可能会为第一反应者提供一个机会来拦截全球范围的流行病。我们提出了一个可扩展的框架来检测,在近实时的,活跃的互联网蠕虫在全球网络,包括公共和私人。通过聚合由于数据包传递失败而导致的网络错误消息,我们能够推断互联网络上主机的异常连接行为。ICMP (Internet Control Message Protocol)协议提供这种错误通知。使用可能无限数量的收集器和分析器,我们识别活动的“爆发”。然后,这些“花朵”的连接特征被关联起来,以识别类似蠕虫的行为,并发出警报。一个模拟的互联网蠕虫已经产生了令人鼓舞的结果,表明可以在发布后的最初几分钟内检测到新的蠕虫,这取决于参与路由器覆盖的水平。