An email worm vaccine architecture

13Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present an architecture for detecting "zero-day" worms and viruses in incoming email. Our main idea is to intercept every incoming message, pre-scan it for potentially dangerous attachments, and only deliver messages that are deemed safe. Unlike traditional scanning techniques that rely on some form of pattern matching (signatures), we use behavior-based anomaly detection. Under our approach, we "open" all suspicious attachments inside an instrumented virtual machine looking for dangerous actions, such as writing to the Windows registry, and flag suspicious messages. The attachment processing can be offloaded to a cluster of ancillary machines (as many as are needed to keep up with a site's email load), thus not imposing any computational load on the mail server. Messages flagged are put in a "quarantine" area for further, more labor-intensive processing. Our implementation shows that we can use a large number of malware-checking VMs operating in parallel to cope with high loads. Finally, we show that we are able to detect the actions of all malicious software we tested, while keeping the false positive rate to under 5%. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Sidiroglou, S., Ioannidis, J., Keromytis, A. D., & Stolfo, S. J. (2005). An email worm vaccine architecture. In Lecture Notes in Computer Science (Vol. 3439, pp. 97–108). Springer Verlag. https://doi.org/10.1007/978-3-540-31979-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free