skip to main content
10.1145/2381716.2381867acmotherconferencesArticle/Chapter ViewAbstractPublication PagescubeConference Proceedingsconference-collections
research-article

Defending against internet worms using honeyfarm

Authors Info & Claims
Published:03 September 2012Publication History

ABSTRACT

With new worms appearing at fast pace off late, conventional classification and defense techniques are not adequate to cover wide spectrum of recent worm attacks like stuxnet (2010), morto (June 2011), and DuQu (Oct 2011). Honeypots have been found to be effective for zero day threats, and recent trend for defending against worms leverages the advantages of honeypot alone, or honeypots combined with either signature or anomaly based detection. Although such honeypot based techniques are effective, they become resource intensive when multiple honeypot sensors are used. Moreover, the techniques suffer from one or more limitations of high false positives, false negatives, reduced sensitivity and specificity.

In this paper we discuss a classification of worms which is more exhaustive compared to the earlier classifications. It includes recent worm attacks as well as gives a better and quicker understanding of the recent worm behavior aiding in the design of accurate defense mechanisms. Further a novel hybrid scheme is proposed that integrates anomaly and signature detection with honeypots. At first level we used Signature based detection, for known worm attacks, that makes the system operate in real time. Any deviation from the normal behavior can be easily detected by anomaly detector in second level. Last level is honeypots which helps in detecting zero day attacks. We leverage the advantage of honeyfarm by deploying honeypots and both the detectors in a resource efficient advantage. Controller redirects the traffic to the respective honeypots. To ensure the security of controller, the role of controller is alternated among the honeypots periodically. We validate the proposed scheme by deploying a realistic setup in local environment. Metasploit has been used to generate attack traffic. We compare our proposed scheme against various existing honeypot based defense mechanisms and observe an increase of 32.78% in the detection rate as well as a reduction of 33.3% in the false alarm rate.

Our proposed model combines detection scheme (i.e. signature based and anomaly based) with containment scheme, taking the advantages of both and hence developing an effective defense against Internet worms.

References

  1. Li, P., Salour, M. and Su, X. A survey of internet worm detection and containment, Communications Surveys & Tutorials, IEEE, vol. 10, pp. 20--35, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Nicholas, W., Vern, P., Stuart, S. and Robert, C. A taxonomy of computer worms, presented at the Proceedings of the 2003 ACM workshop on Rapid malcode, Washington, DC, USA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Qing, S. and Wen, W. A survey and trends on Internet worms, Computers & Security, vol. 24, pp. 334--346, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jai.n, P. and Sardana, A. A hybrid honeyfarm based technique for defense against worm attacks, in Information and Communication Technologies (WICT), 2011 World Congress on, 2011, pp. 1084--1089.Google ScholarGoogle Scholar
  5. Oudot, L. Fighting internet worms with honeypots, WWW-Seite, http://www.securityfocus.com/infocus/1740, 2003.Google ScholarGoogle Scholar
  6. Stafford, S. and Li, J. Behavior-Based Worm Detectors Compared Recent Advances in Intrusion Detection. vol. 6307, S. Jha, R. Sommer, and C. Kreibich, Eds., ed: Springer Berlin/Heidelberg, 2010, pp. 38--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Garuba, M., Chunmei, L. and Washington, N. A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers, in Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on, 2008, pp. 628--632. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kreibich, C. and Crowcroft, J. Honeycomb: creating intrusion detection signatures using honeypots, ACM SIGCOMM Computer Communication Review, vol. 34, pp. 51--56, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Thakar, U., Varma, S. and Ramani, A. HoneyAnalyzer--analysis and extraction of intrusion detection patterns & signatures using honeypot, The Second International Conference on Innovations in Information Technology (IIT'05), 2005.Google ScholarGoogle Scholar
  10. Dagon, D., Qin, X., Gu, G., Lee, W., Grizzard, J., Levine, J. and Owen, H Honeystat: Local worm detection using honeypots, Recent Advances in Intrusion Detection, vol. 3224, ed: Springer Berlin, 2004, pp. 39--58.Google ScholarGoogle ScholarCross RefCross Ref
  11. Mohammed, M. M. Z. E., Chan, H. A. and Ventura, N. Honeycyber: Automated signature generation for zero-day polymorphic worms, in Military Communications Conference, 2008. MILCOM 2008. IEEE, 2008, pp. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  12. Portokalidis, G. and Bos, H. SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots, Computer Networks, vol. 51, pp. 1256--1274, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Portokalidis, G., Slowinska, A. and Bos, H. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation, ACM SIGOPS Operating Systems Review, vol. 40, pp. 15--27, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Yu, Y., Jun-wei, L., Fu-xiang, G., Ge, Y. and Qing-xu, D. Detecting and Defending against Worm Attacks Using Bot-honeynet, in Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on, 2009, pp. 260--264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Anagnostakis, K. G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E. and Keromytis, A. D. Detecting targeted attacks using shadow honeypots, presented at the Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, Baltimore, MD, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kreibich, C., Weaver, N., Kanich, C., Cui, W. and Paxson, V. GQ: Practical Containment for Measuring Modern Malware Systems, Technical Report TR-11-002, International Computer Science Institute2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Shamsuddin, S. and Woodward, M. Modeling protocol based packet header anomaly detector for network and host intrusion detection systems, Cryptology and Network Security, pp. 209--227, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Defending against internet worms using honeyfarm

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            CUBE '12: Proceedings of the CUBE International Information Technology Conference
            September 2012
            879 pages
            ISBN:9781450311854
            DOI:10.1145/2381716

            Copyright © 2012 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 3 September 2012

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader