Skip to main content

A Worm Behavioral Approach to Susceptible Host Detection

  • Conference paper
Grid and Cooperative Computing - GCC 2005 (GCC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 3795))

Included in the following conference series:

  • 402 Accesses

Abstract

A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter-attack to the susceptible host can be proposed. As a case study, a simulation on the IDS-based anti-worm counter-attacking the malicious worm is given, which shows the new containment is much more effective and bring less traffic to network than the traditional one. It can be used as a reference for Grid security infrastructure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Chen, T.M.: Trends in Viruses and Worms. The Internet Protocol Journal 6(3), 23–33 (2003)

    Google Scholar 

  2. Levy, E.: Approaching Zero. IEEE Security & Privacy Magazine 2(4), 65–66 (2004)

    Article  Google Scholar 

  3. Hwang, K., Kwok, Y.K., Song, S.S.: GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. In: International Workshop on Grid Computing Security and Resource Management, GSRM 2005 (2005)

    Google Scholar 

  4. Yu, W.: Analyze the Worm-based Attack in Large Scale P2P Networks. In: Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering, HASE 2004 (2004)

    Google Scholar 

  5. Zhuge, H., Shi, X.: Fighting Epistemology in Knowledge and Information Age. IEEE Computer 36(10), 114–116 (2003)

    Google Scholar 

  6. Castaneda, F., et al.: WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism. In: Proceedings of ACM Workshop on Rapid Malcode, WORM 2004 (October 2004)

    Google Scholar 

  7. Mullen, T.: Defending your right to defend: Considerations of an automated strike-back technology (October 2002), http://www.hammerofgod.com/strikeback.txt

  8. Provos, N.: A virtual honeypot framework. CITI Technical Report 03-1 (October 2003)

    Google Scholar 

  9. http://www.snort.org/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, B., Fang, B., Yun, X. (2005). A Worm Behavioral Approach to Susceptible Host Detection. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_9

Download citation

  • DOI: https://doi.org/10.1007/11590354_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30510-1

  • Online ISBN: 978-3-540-32277-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics