TY - JOUR
T1 - A rough set approach for automatic key attributes identification of zero-day polymorphic worms
AU - Sun, Wen Chen
AU - Chen, Yi Ming
PY - 2009/4
Y1 - 2009/4
N2 - In recent years, given their rapid propagations, Internet worms increasingly threaten the Internet hosts and services. It's worsen by the fact that zero-day polymorphic worms, which can change their patterns dynamically, would evade most existing intrusion detection systems which depend on some signature generating approach. In this paper, we propose a novel rough set worm detection (RSWD) scheme which extends well developed rough set theory (RST) to detect zero-day polymorphic worms and provide a minimum set of filtering rules to network barrier equipments, such as firewall, to block worm spreading. The RSWD scheme is based on an assumption that, for a polymorphic worm, all attack packets are generated from some specific worm program and attack the same vulnerability of the victim hosts, therefore some patterns exist even the polymorphic engine mutates dynamically and frequently. Our simulations show that, in a class B network containing a new polymorphic worm which can not be recognized by any known signature, the RSWD module could detect the worm propagation within 17 s and produce a precise blocking rule exhibiting 100% true positive rate and 99.82% accuracy rate.
AB - In recent years, given their rapid propagations, Internet worms increasingly threaten the Internet hosts and services. It's worsen by the fact that zero-day polymorphic worms, which can change their patterns dynamically, would evade most existing intrusion detection systems which depend on some signature generating approach. In this paper, we propose a novel rough set worm detection (RSWD) scheme which extends well developed rough set theory (RST) to detect zero-day polymorphic worms and provide a minimum set of filtering rules to network barrier equipments, such as firewall, to block worm spreading. The RSWD scheme is based on an assumption that, for a polymorphic worm, all attack packets are generated from some specific worm program and attack the same vulnerability of the victim hosts, therefore some patterns exist even the polymorphic engine mutates dynamically and frequently. Our simulations show that, in a class B network containing a new polymorphic worm which can not be recognized by any known signature, the RSWD module could detect the worm propagation within 17 s and produce a precise blocking rule exhibiting 100% true positive rate and 99.82% accuracy rate.
KW - Polymorphic worm
KW - Rough set theory
KW - Zero-day attack
UR - http://www.scopus.com/inward/record.url?scp=58349117882&partnerID=8YFLogxK
U2 - 10.1016/j.eswa.2008.06.037
DO - 10.1016/j.eswa.2008.06.037
M3 - 期刊論文
AN - SCOPUS:58349117882
SN - 0957-4174
VL - 36
SP - 4672
EP - 4679
JO - Expert Systems with Applications
JF - Expert Systems with Applications
IS - 3 PART 1
ER -