Back to Search Start Over

Early containment of worms using dummy addresses and connection trace back

Authors :
T. Inaba
S. Tahara
Hiroshi Shigeno
Nobutaka Kawaguchi
Ken-ichi Okada
Source :
ICPADS
Publication Year :
2007
Publisher :
IEEE, 2007.

Abstract

Most of existing network worms have used address scanning to find vulnerable hosts. Recently, however, worms with more effective propagation strategies have emerged. Among the worms, we focus on the worms that exploit address lists obtained from infected hosts to find other vulnerable hosts effectively. In this paper, we propose a method to detect and contain such worms that try to infect all hosts in an enterprise network. In our method, a detection system inserts some dummy addresses into the address lists of hosts in the network. Then, the system detects the existence of worms when a host tries to open a connection to a dummy address, and then traces back the connection logs to find potentially infected hosts and removes them from the network. Computer simulation results showed our method detected and contained worms with less than 1% infected hosts and less than 5% removed hosts.

Details

Database :
OpenAIRE
Journal :
2007 International Conference on Parallel and Distributed Systems
Accession number :
edsair.doi...........a5e1e96e439e0e7ed6a122b9f15518b3
Full Text :
https://doi.org/10.1109/icpads.2007.4447717