Skip to main content

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning

  • Conference paper
Intelligent Data Engineering and Automated Learning – IDEAL 2004 (IDEAL 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3177))

Abstract

As a vast number of services have been flooding into the Internet, it is more likely for the Internet resources to be exposed to various hacking activities such as Code Red and SQL Slammer worm. Since various worms quickly spread over the Internet using self-propagation mechanism, it is crucial to detect worm propagation and protect them for secure network infrastructure. In this paper, we propose a mechanism to detect worm propagation using the computation of entropy of network traffic and the compilation of network traffic. In experiments, we tested our framework in simulated network settings and could successfully detect worm propagation.

This work has been supported by the Korea Research Foundation under grant KRF-2003-041-D20465, and by the KISTEP under National Research Laboratory program.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Berk, V.H., et al.: Using Sensor Networks and Data Fusion for Early Detection of Active Worms. SPIE AeroSense (2003)

    Google Scholar 

  2. Clark, P., Niblett, T.: The CN2 Induction Algorithm. Machine Learning Journal 3, 261–283 (1989)

    Google Scholar 

  3. Danyliw, R., Householder, A.: CERT Advisory CA-2001-19 “Code Red” Worm Exploiting Buffer Overflow in IIS Indexing Service DLL. CERT Coordination Center (2001)

    Google Scholar 

  4. Gray, R.M.: Entropy and Information Theory, pp. 39–40. Springer, Heidelberg (1990)

    MATH  Google Scholar 

  5. Hanson, R., Stutz, J., Cheeseman, P.: Bayesian Classification Theory. Technical Report FIA-90-12-7-01, NASA Ames Research Center, AI Branch (1991)

    Google Scholar 

  6. Holder, L.: ML v2.0: Machine Learning Program Evaluator. available on-line: http://www-cse.uta.edu/~holder/ftp/ml2.0.tar.gz

  7. Houle, J.K., Weaver, M.G.: Trends in Denial of Service Attack Technology. CERT Coordination Center (2001)

    Google Scholar 

  8. Lan, K., et al.: Effect of Malicious Traffic on the Network. PAM (2003)

    Google Scholar 

  9. Lawrence Berkeley National Labs Network Research Group.: libpcap. available on-line: http://ftp.ee.lbl.gov

  10. Moore, D., et al.: The Spread of the Sapphire/Slammer Worm (2003), available on-line: http://www.cs.berkeley.edu/~nweaver/sapphire/

  11. Noh, S., et al.: Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. In: Liu, J., Cheung, Y.-m., Yin, H. (eds.) IDEAL 2003. LNCS, vol. 2690, pp. 286–295. Springer, Heidelberg (2003)

    Google Scholar 

  12. Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  13. Standard Performance Evaluation Corporation: SPECweb 1999, Benchmark (1999), available online: http://www.spec.org/osg/web99

  14. Toth, T., Kruegel, C.: Connection-history based Anomaly Detection. In: The 2002 IEEE Workshop on Information Assurance and Security (2002)

    Google Scholar 

  15. Valdes, A.: Entropy Characteristics of Propagating Internet Phenomena. In: The Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Noh, S., Lee, C., Ryu, K., Choi, K., Jung, G. (2004). Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. In: Yang, Z.R., Yin, H., Everson, R.M. (eds) Intelligent Data Engineering and Automated Learning – IDEAL 2004. IDEAL 2004. Lecture Notes in Computer Science, vol 3177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-28651-6_59

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-28651-6_59

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22881-3

  • Online ISBN: 978-3-540-28651-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics