Back to Search
Start Over
Early containment of worms using dummy addresses and connection trace back
- Source :
- ICPADS
- Publication Year :
- 2007
- Publisher :
- IEEE, 2007.
-
Abstract
- Most of existing network worms have used address scanning to find vulnerable hosts. Recently, however, worms with more effective propagation strategies have emerged. Among the worms, we focus on the worms that exploit address lists obtained from infected hosts to find other vulnerable hosts effectively. In this paper, we propose a method to detect and contain such worms that try to infect all hosts in an enterprise network. In our method, a detection system inserts some dummy addresses into the address lists of hosts in the network. Then, the system detects the existence of worms when a host tries to open a connection to a dummy address, and then traces back the connection logs to find potentially infected hosts and removes them from the network. Computer simulation results showed our method detected and contained worms with less than 1% infected hosts and less than 5% removed hosts.
- Subjects :
- Containment (computer programming)
Software_OPERATINGSYSTEMS
Exploit
Computer science
ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS
fungi
Computer security
computer.software_genre
Trace (semiology)
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
parasitic diseases
Computer worm
Enterprise private network
computer
Host (network)
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- 2007 International Conference on Parallel and Distributed Systems
- Accession number :
- edsair.doi...........a5e1e96e439e0e7ed6a122b9f15518b3
- Full Text :
- https://doi.org/10.1109/icpads.2007.4447717