期刊文献+

Detection and location algorithm against local-worm

Detection and location algorithm against local-worm
原文传递
导出
摘要 The spread of the worm causes great harm to the computer network. It has recently become the focus of the network security research. This paper presents a local-worm detection algorithm by analyzing the characteristics of traffic generated by the TCP-based worm. Moreover, we adjust the worm location algorithm, aiming at the differences between the high-speed and the low-speed worm scanning methods. This adjustment can make the location algorithm detect and locate the worm based on different scanning rate. Finally, we verified the validity and efficiency of the proposed algorithm by simulating it under NS-2. The spread of the worm causes great harm to the computer network. It has recently become the focus of the network security research. This paper presents a local-worm detection algorithm by analyzing the characteristics of traffic generated by the TCP-based worm. Moreover, we adjust the worm location algorithm, aiming at the differences between the high-speed and the low-speed worm scanning methods. This adjustment can make the location algorithm detect and locate the worm based on different scanning rate. Finally, we verified the validity and efficiency of the proposed algorithm by simulating it under NS-2.
出处 《Science in China(Series F)》 2008年第12期1935-1946,共12页 中国科学(F辑英文版)
基金 the National Natural Science Foundation of China (Grant No. 60403028)
关键词 worm detection traffic characteristic detection and location worm detection, traffic characteristic, detection and location
  • 相关文献

参考文献10

  • 1Wu J,Vangala S,Gao L, et al.An efficient architecture and algorithm for detecting worms with various scan techniques[].Proceedings of the Network and Distributed System Security Symposium (NDSS ).2004
  • 2Yang X Y,Zeng M,Zhao R, et al.A novel LMS method for real-time network Traffic Prediction[].Computational Science and Its Applications-ICCSA.2004
  • 3Shi Y,Yang X Y,Zhu H J.A flooding-based DoS/DDoS detecting algorithm based on traffic measurement and prediction[].Advances in Information and Computer Security.2006
  • 4Yang X Y,Liu Y,Zeng M, et al.A novel DDoS attack detecting algorithm based on the continuous wavelet transform[].Lecture Notes in Computer Science.2004
  • 5Tang Y J,Luo X P,Yang Z J.Fault detection through multi-fractal nature of traffic[].Communications Circuits and Systems and West Sino Expositions IEEE International Conference on.2002
  • 6Stevens W R.TCP/IP Illustrated Volume 1: The Protocols[]..2004
  • 7Antonatos S,Akritidis P,Markatos E P, et al.Defending against Hitlist worms using network address space randomization[].Proceedings of the ACM workshop on Rapid malcode (WORM‘).2005
  • 8.Net worm using Google to spread[]..
  • 9Peng T,Leckie C,Ramamohanarao K.Detecting reflector attacks by sharing beliefs[].Global Telecommunications Con- ference (GLOBECOM‘) IEEE.2003
  • 10Weaver N,Paxson V,Staniford S, et al.A taxonomy of computer worms[].Proceedings of the ACM workshop on Rapid Malcode (WORM‘).2003

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部