Abstract
We present two light-weight worm detection algorithms that offer significant advantages over fixed-threshold methods. The first algorithm, RBS (rate-based sequential hypothesis testing), aims at the large class of worms that attempts to quickly propagate, thus exhibiting abnormal levels of the rate at which hosts initiate connections to new destinations. The foundation of RBS derives from the theory of sequential hypothesis testing, the use of which for detecting randomly scanning hosts was first introduced by our previous work developing TRW [6]. The sequential hypothesis testing methodology enables us to engineer detectors to meet specific targets for false-positive and false-negative rates, rather than triggering when fixed thresholds are crossed. In this sense, the detectors that we introduce are truly adaptive.
We then introduce RBS+TRW, an algorithm that combines fan-out rate (RBS) and probability of failure (TRW) of connections to new destinations. RBS+TRW provides a unified framework that at one end acts as pure RBS and at the other end as pure TRW. Selecting an operating point that includes both mechanisms extends RBS’s power in detecting worms that scan randomly selected IP addresses. Using four traces from three qualitatively different sites, we evaluate RBS and RBS+TRW in terms of false positives, false negatives, and detection speed, finding that RBS+TRW provides good detection of high-profile worms as well as internal Web crawlers that we use as proxies for targeting worms. In doing so, RBS+TRW generates fewer than 1 false alarm per hour for wide range of parameter choices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nmap — free security scanner for network exploration & security audits, http://www.insecure.org/nmap/
Chen, S., Tang, Y.: Slowing Down Internet Worms. In: Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004) Tokyo, Japan (March 2004)
Ehtereal.com. Ethereal, http://www.ethereal.com/
Eichin, M.W., Rochlis, J.A.: With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (1989)
F-Secure. F-Secure Virus Descriptions: Santy, http://www.f-secure.com/v-descs/santy_a.shtml
Jung, J., Paxson, V., Berger, A. W., and Balakrishnan, H. Fast Portscan Detection Using Sequential Hypothesis Testing. In: Proceedings of the IEEE Symposium on Security and Privacy (May 9–12, 2004)
Kim, H.-A., Karp, B.: Autograph: Toward Automated Distributed Worm Signature Detection. In: Proceedings of the 13th USENIX Security Symposium (August 9–13, 2004)
Schechter, S.E., Jung, J., Berger, A.W.: Fast Detection of Scanning Worm Infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, Springer, Heidelberg (2004)
Singh, S., Estan, C., Varghese, G., and Savage, S. Automated Worm Fingerprinting. In: Proceedings of the 13th Operating Systems Design and Implementation OSDI (December 2004)
Spafford, E. H. A Failure to Learn from the Past. In: Proceedings of the 19th Annual Computer Security Applications Conference. December 8–12, 2003 pp. 217–233 (2003)
Staniford, S., Paxson, V., Weaver, N.: How to 0wn the Internet in Your Spare Time. In: Proceedings of the 11th USENIX Security Symposium Berkeley, CA, USA, August 5–9, 2002 USENIX Association, pp. 149–170 (2002)
Turkey, J.W.: A survey of sampling from contaminated distributions. In: Contributions to Probability and Statistics, Stanford University Press (1960)
Twycross, J., Williamson, M.M.: Implementing and Testing a Virus Throttle. In: Proceedings of the 12th USENIX Security Symposium (August 4–8, 2003)
Wald, A.: Sequential Analysis. J. Wiley & Sons, New York (1947)
Wang, K., Cretu, G., Stolfo, S.J: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A Taxonomy of Computer Worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, October 27, 2003, pp. 11–18. ACM Press, New York (2003)
Weaver, N., Staniford, S., and Paxson, V. Very Fast Containment of Scanning Worms. In: Proceedings of the 13th USENIX Security Symposium (August 9–13, 2004)
Whyte, D., Kranakis, E., van Oorschot, P.: DNS-based Detection of Scanning Worms in an Enterprise Network. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2005) (February 2005)
Williamson, M. M. Throttling Viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of The 18th Annual Computer Security Applications Conference (ACSAC 2002) (December 9–13, 2002)
Wong, C., Bielski, S., Studer, A., Wang, C.: Empirical analysis of rate limiting mechanisms. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jung, J., Milito, R.A., Paxson, V. (2007). On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. In: M. Hämmerli, B., Sommer, R. (eds) Detection of Intrusions and Malware, and Vulnerability Assessment. DIMVA 2007. Lecture Notes in Computer Science, vol 4579. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73614-1_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-73614-1_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73613-4
Online ISBN: 978-3-540-73614-1
eBook Packages: Computer ScienceComputer Science (R0)