An automatic, prompt, and accurate exploit-based method to generate polymorphic worm's signature

Sureswaran Ramadass*, Shubair A. Abdulla, Altyeb Altaher Altyeb

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all encrypted payloads share the same invariant exploit code to ensure exploiting same vulnerability in same manner on all victims. This research paper is an endeavor to interpret the invariant part into signature. The basic idea of the proposed method is to assemble attacking payloads on a honeypot, and then extracting the worm's signature by using a matching technique. The experiments were conducted on two datasets, Witty worm's payloads and synthetic payloads, and have demonstrated promising results.

Original languageEnglish
Title of host publicationProceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011
Pages37-41
Number of pages5
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011 - Shenzhen, China
Duration: Oct 28 2011Oct 30 2011

Publication series

NameProceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011

Conference

Conference2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011
Country/TerritoryChina
CityShenzhen
Period10/28/1110/30/11

Keywords

  • exploit code
  • intrusion detection systems
  • synthetic worms
  • worm signature

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this