Figure 3: A two-stage worm detection system.
system, the first stage detects worms by using signa-
ture vectors at a low calculation cost. The remaining
flows are sent to the second stage as suspicious flows.
In the second stage, worms are detected from the sus-
picious flows. Because the number of flows analyzed
during the second stage is significantly reduced by
the first stage analysis, the total calculation cost of
the proposed system is lower than that of the conven-
tional detection system. At least one sample of worm
flow is required for the proposed technique to gener-
ate a signature vector. Worms detected in the second
stage are used as sample flows. The system conducts
the process only when the number of the same kind
of sample flows exceeds a constant number or if fixed
time passes from the last process in order to reduce
the signature vector generating cost.
In the same environment as Section 3.3, we eval-
uated the detection performance of two-stage system
using Netsky.P worm. The number of signature vec-
tors finally generated was three. Moreover, when the
number of sample flows was 40 or more, all 314 flows
could be detected in the first stage. Consequently, the
analysis of the 314 Netsky.P flows by the second stage
would not be conducted, the calculation cost could be
reduced by the proposed system.
5 CONCLUSIONS AND FUTURE
WORK
In this paper, we proposed a time efficient and low
cost worm detection system. The proposed worm de-
tection method evaluates flow similarity by a vector
based on the appearance probability of the byte code
of flow payloads. The evaluation experiment showed
that the method achieves a high detection accuracy
while significantly reducing the calculation cost dur-
ing detection. We also proposed the worm detection
system which uses the above-mentioned method as
the first stage and existing IDS as the second stage.
Through evaluation experiment, we showed that the
proposed system is a highly accurate and a low-cost
worm detection system.
Future work is to use the proposed method alone
to achieve low-cost worm detection. At the same
time, a high accuracy is required. A distributed
scheme, as introduced by (Staniford et al., 2002),
where signatures are shared amongst networks can
further enhance the effectiveness of the proposed
scheme.
REFERENCES
Akritidis, P., Anagnostakis, K., and Markatos, E. P. (2005).
Efficient content-based detection of zero-day worms.
In Proceedings of the International Conference on
Communications (I CC 2005).
Bleeding Edge Threats (2004).
http://www.
bleedingsnort.com
.
Kim, H. and Karp, B. (2004). Autograph: toward auto-
mated, distributed worm signature detec tion. In Pro-
ceedings of the 13th USENIX Security Symposium.
Kruegel, C., Toth, T., and Kirda, E. (2002). Service specific
anomaly detection for network intrusion dete ction. In
Symposium on Applied Computing (SAC).
Newsome, J., James, B., Karp, B., and Song, D. (2005).
Polygraph: Automatically generating signatures for
polymorphic worms. In Proceedings of the 2005 IEEE
Symposium on Security and Pri vacy. IEEE Computer
Society.
Simkhada, K., Tsunoda, H., Waizumi, Y., and Nemoto, Y.
(2005). Differencing worm flows and normal flows for
automatic genera tion of worm signatures. In Proceed-
ings of the Seventh IEEE International Symposium on
Mu ltimedia (ISM).
Singh, S., Estan, C., Varghese, G., and Savage, S. (2004).
Automated worm fingerprinting. In Proceedings of the
6th ACM/USENIX Symposium on Operating System
Design and Implementation (OSDI).
Snort (1998).
http://www.snort.org
.
Staniford, S., Paxson, V., and Weaver, N. (2002). How to
0wn the Internet in your spare time. In Proceedings of
the 11th USENIX Security Symposium.
Tsuji, M., Waizumi, Y., Tsunoda, H., and Nemoto, Y.
(2005). Detecting worms based on similarity of flow
payloads. In IEICE Tech. Rep. NS2005-112, pages 9–
12.
Waizumi, Y., Tsuji, M., and Nemoto, Y. (2005). A de-
tection technique of epidemic worms using clustering
of p acket payload. In IEICE Tech. Rep. CS2005-19,
pages 19–24.
Wang, K., Cretu, G., and Stolfo, S. (2005). Anomalous
payload-based worm detection and signature genera-
tion.˙In Proceedings of the Eighth International Sym-
posium on Recent Adva nces in Intrusion Detection.
Yaneza, J. L. A., Mantes, C., and Avena, E. (2005). The
Trend of Malware Today: Annual Virus Round-up and
2005 Forecast. Trend Micro.
A LOW COST WORM DETECTION TECHNIQUE BASED ON FLOW PAYLOAD SIMILARITY
417