期刊文献+

Immunity Based Worm Detection System

Immunity Based Worm Detection System
下载PDF
导出
摘要 Current worm detection methods are unable to detect multi-vector polymorphic worms effectively. Based on negative selection mechanism of the immune system, a local network worm detection system that detects worms was proposed. Normal network service requests were represented by self-strings, and the detection system used self-strings to monitor the network for anomaly. According to the properties of worm propagation, a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection. Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms. Current worm detection methods are unable to detect multi-vector polymorphic worms effectively. Based on negative selection mechanism of the immune system, a local network worm detection system that detects worms was proposed. Normal network service requests were represented by self-strings, and the detection system used self-strings to monitor the network for anomaly. According to the properties of worm propagation, a control center correlated the anomalies detected in the form of binary trees to ensure the accuracy of worm detection. Experiments show the system to be effective in detecting the traditional as well as multi-vector polymorphic worms.
出处 《Journal of Beijing Institute of Technology》 EI CAS 2007年第1期67-73,共7页 北京理工大学学报(英文版)
基金 the National"863"Program Project (2002AA141090 ,2004AA147070)
关键词 worm detection immune system negative selection worm detection immune system negative selection
  • 相关文献

参考文献9

  • 1Hof meyr S A.Ani mmunological model of distributed de- tection andits application to computer security[]..1999 被引量:1
  • 2Staniford S,,Cheung S,Crawford R.The design of GrIDS: A graph-based intrusion detection system[].th National Information Systems Security Conference.1996 被引量:1
  • 3Lee WK,Stolfo S J.Data mining approaches for intru- sion detection[].th USENIX Security Symposium.1998 被引量:1
  • 4Whyte D,,Kranakis E,Oorschot P V.DNS based detec- tion of scanning worms in an enterprise network[].th Annual Network and Distributed System Security Symposium.2005 被引量:1
  • 5Nazario J.Defense and detection strategies against Inter- net worms[ M][]..2004 被引量:1
  • 6Forrest S,,Perelson AS,Allen L.Self-nonself dis- cri minationin a computer[].Proc of the IEEE Sym- posiumon Research in Security and Privacy.1994 被引量:1
  • 7Microsoft Corporation.Port requirements for Microsoft Windows server system. .http:∥support . Microsoft .com/kb/832017/en-us . 2005 被引量:1
  • 8Gu G F,,Sharif M,Qin X Z.Worm detection, early warning and response based onlocal victi minforma- tion[].Proceedings of the th Annual Computer Se- curity Applications Conference.2004 被引量:1
  • 9Thomas T,Christopher K.Connection-history based anomaly detection[].Proc of the IEEE Work- shop onInformation Assurance and Security.2002 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部