SAS: Semantics aware signature generation for polymorphic worm detection

8Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

String extraction and matching techniques have been widely used in generating signatures for worm detection, but how to generate effective worm signatures in an adversarial environment still remains challenging. For example, attackers can freely manipulate byte distributions within the attack payloads and also can inject well-crafted noisy packets to contaminate the suspicious flow pool. To address these attacks, we propose SAS, a novel Semantics Aware Statistical algorithm for automatic signature generation. When SAS processes packets in a suspicious flow pool, it uses data flow analysis techniques to remove non-critical bytes. We then apply a Hidden Markov Model (HMM) to the refined data to generate state-transition-graph based signatures. To our best knowledge, this is the first work combining semantic analysis with statistical analysis to automatically generate worm signatures. Our experiments show that the proposed technique can accurately detect worms with concise signatures. Moreover, our results indicate that SAS is more robust to the byte distribution changes and noise injection attacks comparing to Polygraph and Hamsa.© Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.

Cite

CITATION STYLE

APA

Kong, D., Jhi, Y. C., Gong, T., Zhu, S., Liu, P., & Xi, H. (2010). SAS: Semantics aware signature generation for polymorphic worm detection. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 50 LNICST, pp. 1–19). https://doi.org/10.1007/978-3-642-16161-2_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free