Abstract
A new detection approach based on worm behaviors for IDS anti-worm is presented. By the method, the susceptible hosts probed by worms can be detected, and then an immediate counter-attack to the susceptible host can be proposed. As a case study, a simulation on the IDS-based anti-worm counter-attacking the malicious worm is given, which shows the new containment is much more effective and bring less traffic to network than the traditional one. It can be used as a reference for Grid security infrastructure.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Chen, T.M.: Trends in Viruses and Worms. The Internet Protocol Journal 6(3), 23–33 (2003)
Levy, E.: Approaching Zero. IEEE Security & Privacy Magazine 2(4), 65–66 (2004)
Hwang, K., Kwok, Y.K., Song, S.S.: GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. In: International Workshop on Grid Computing Security and Resource Management, GSRM 2005 (2005)
Yu, W.: Analyze the Worm-based Attack in Large Scale P2P Networks. In: Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering, HASE 2004 (2004)
Zhuge, H., Shi, X.: Fighting Epistemology in Knowledge and Information Age. IEEE Computer 36(10), 114–116 (2003)
Castaneda, F., et al.: WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism. In: Proceedings of ACM Workshop on Rapid Malcode, WORM 2004 (October 2004)
Mullen, T.: Defending your right to defend: Considerations of an automated strike-back technology (October 2002), http://www.hammerofgod.com/strikeback.txt
Provos, N.: A virtual honeypot framework. CITI Technical Report 03-1 (October 2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, B., Fang, B., Yun, X. (2005). A Worm Behavioral Approach to Susceptible Host Detection. In: Zhuge, H., Fox, G.C. (eds) Grid and Cooperative Computing - GCC 2005. GCC 2005. Lecture Notes in Computer Science, vol 3795. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590354_9
Download citation
DOI: https://doi.org/10.1007/11590354_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30510-1
Online ISBN: 978-3-540-32277-1
eBook Packages: Computer ScienceComputer Science (R0)