An Automated Signature-Based Approach against Polymorphic Internet Worms
#1

An Automated Signature-Based Approach against Polymorphic Internet Worms
Yong Tang and Shigang Chen
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 18, NO. 7
Abstract—
Capable of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. However, the defenseagainst them is still an open problem. This paper attempts to answer an important question: How can we distinguish polymorphicworms from normal background traffic? We propose a new worm signature, called the position-aware distribution signature (PADS),which fills the gap between traditional signatures and anomaly-based intrusion detection systems. The new signature is a collection ofposition-aware byte frequency distributions. It is more flexible than the traditional signatures of fixed strings while it is more precise thanthe position-unaware statistical signatures. We propose two algorithms based on Expectation-Maximization (EM) and Gibbs Samplingto efficiently compute PADS from a set of polymorphic worm samples. We also discuss how to separate a mixture of different
polymorphic worms such that their respective PADS signatures can be calculated. We perform extensive experiments to demonstratethe effectiveness of PADS in separating new worm variants from normal background traffic.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: modelling and automated containment of worms seminar**based smart sensor networks, internet topic for against, fuzzy similarity approach for automated spam ppt, internet security against hacking system, seminar topics multi dimention approach for internet security, automated containment worms, internet security against hacking systems ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Multi signature smart paper boy 2 2,061 11-01-2016, 02:00 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 43,679 16-09-2015, 02:51 PM
Last Post: seminar report asees
Star Internet Telephony Policy in INDIA Computer Science Clay 3 3,303 21-09-2014, 06:10 PM
Last Post: Guest
  GREEN CLOUD -A Data Center Approach computer topic 0 1,530 25-03-2014, 10:13 PM
Last Post: computer topic
  Automated Storage/Retrieval System seminar class 3 3,017 02-09-2013, 11:09 AM
Last Post: uchconveyor
  Layered Approach Using Conditional Random Fields for Intrusion Detection project report helper 11 7,739 01-03-2013, 11:58 AM
Last Post: [email protected]
Exclamation Internet Access via TV cable Network pritam 14 19,549 08-12-2012, 03:50 PM
Last Post: seminar details
  ADDING INTELLIGENCE TO INTERNET USING SATELLITES seminar projects crazy 6 6,454 03-12-2012, 03:06 PM
Last Post: seminar details
  Digital Signature Guidelines Electrical Fan 1 1,703 27-11-2012, 12:06 PM
Last Post: seminar details
  OBJECT-ORIENTED APPROACH IN SOFTWARE DEVELOPMENT project report helper 2 2,479 20-11-2012, 12:48 PM
Last Post: seminar details

Forum Jump: