skip to main content
10.1145/2556871.2556906acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicccConference Proceedingsconference-collections
research-article

CBSTM: Cloud-based Behavior Similarity Transmission Method to Detect Industrial Worms

Published: 01 December 2013 Publication History

Abstract

Sophisticated industrial worms, such as Stuxnet, Flame, Duqu, have brought much threat in industrial networks. Most existing detection methods use content pattern or aggressive activities as a clue to the existence of worms, which are ineffective against worms that don't have their pattern been known and don't behave aggressively. To detect such worms, we proposed Cloud-based Behavior Similarity Transmission Method (CBSTM). CBSTM is a cloud-based method that utilizes the fundamental feature that a worm propagates from host to host. It monitors behaviors on each host in industrial networks. When same behaviors propagate among hosts and meet given criteria, corresponding hosts are believed to be infected by worms. When the worm is detected, the found behavior sequence is used as this worm's signature to realize instant worm detection afterwards. Since CBSTM doesn't need specific characteristics of worms, it can be generally applied to detecting any worms in industrial networks. The evaluation with detecting Stuxnet confirms the effectiveness of CBSTM.

References

[1]
Wikipedia. 2013. Stuxnet. Retrieved September 23, 2013 from http://en.wikipedia.org/wiki/Stuxnet.
[2]
Idika, N. and Mathur, A. P. 2007. A survey of malware detection techniques. Technical Report. Purdue University at West Lafayette.
[3]
Kumar, S. and Spafford, E. H. 1992. A generic virus scanner for c++. In Proceedings of the 8th Computer Security Applications Conference. IEEE, San Antonio, TX, 210-219.
[4]
Kruegel, C., Kirda, E., Mutz, D., Robertson, W. and Vigna, G. 2005. Polymorphic Worm Detection using Structural Information of Executables. In Proceedings of Recent Advances in Intrusion Detection. Springer-Verlag, Seattle, WA, 207-226.
[5]
Newsome, J., Karp, B. and Song, D. 2005. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In Proceedings of IEEE Symposium on Security and Privacy. IEEE, Oakland, CA, 226-241.
[6]
Nissim, N., Moskovitch, R., Rokach, L. and Elovici Y. 2012. Detecting unknown computer worm activity via support vector machines and active learning. Pattern Analysis and Applications, 15 (Nov. 2012), 459-475.
[7]
Tang, Y. and Chen, S. 2007. An automated signature-based approach against polymorphic internet worms. IEEE Trans. On Parallel and Distributed Systems, 18 (July 2007), 879-892.
[8]
Zou, C.C., Gong, W., Towsley, D. and Gao L. 2005. The monitoring and early detection of internet worms. IEEE/ACM Trans. On Networking, 13 (October 2005), 961-974.
[9]
Wikipedia. 2013. Code Red (computer worm). Retrieved September 23, 2013 from http://en.wikipedia.org/wiki/Code_Red_(computer_worm).
[10]
Jhi, Y-C., Liu, P., Li, L., Gu, Q., Jing, J. and Kesidis, G. 2010. PWC: a proactive worm containment solution for enterprise networks. Security and Communication Networks, 3 (July 2010), 334-354.
[11]
Chen, S., Wang, X., Liu, L., Zhang, X. and Zhang, Z. 2006. WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. In Proceedings of 2006 ACM/IEEE symposium on Architecture for networking and communications systems. ACM Press, San Jose, CA, 173-182.
[12]
Jiang, X. and Zhu, X. 2009. vEye: behavioral footprinting for self-propagating worm detection and profiling. Knowledge and Information Systems, 18 (February 2009), 231-262.
[13]
Kawaguchi, N., Shigeno, H. and Okada, K. 2007. Detection of silent worms using anomaly connection tree. In Proceedings of 21st Advanced Information Networking and Applications Conference. IEEE, Niagara Falls, ON, 412-419.
[14]
Process Control System PCS 7 Security concept PCS 7 & WinCC (Basic) Function Manual. Siemens, Nüürnberg, Germany, April 2012.
[15]
Wikipedia. 2013. SQL Slammer. Retrieved September 23, 2013 from http://en.wikipedia.org/wiki/SQL_Slammer.
[16]
Ellis, D., Aiken, J., Attwood, K. and Tenaglia, S. 2004. A behavioral approach to worm detection. In Proceedings of the 2004 ACM workshop on rapid malcode. ACM Press, Washington, DC, 43-53.

Cited By

View all
  • (2017)Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train2017 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2017.8024636(871-878)Online publication date: Jul-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCC '13: Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
December 2013
285 pages
ISBN:9781450321198
DOI:10.1145/2556871
  • General Chairs:
  • Min Wu,
  • Wei Lee,
  • Program Chairs:
  • Yiyi Zhouzhou,
  • Riza Esa,
  • Xiang Lee
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • ACM Wuhan Chapter: ACM Wuhan Chapter

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud
  2. Industrial Network
  3. Worm

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCC '13

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Locating victims of destructive targeted attacks based on Suspicious Activity Spike Train2017 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC.2017.8024636(871-878)Online publication date: Jul-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media