Investigations of automatic methods for detecting the polymorphic worms signatures

被引:111
作者
Aljawarneh, Shadi A. [1 ]
Moftah, Raja A. [2 ]
Maatuk, Abdelsalam M. [2 ]
机构
[1] Jordan Univ Sci & Technol, Software Engn Dept, Irbid, Jordan
[2] Benghazi Univ, Fac Informat Technol, Benghazi, Libya
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 60卷
关键词
Polymorphic worms; Simplified Regular Expression; Autograph; Polygraph; Software security; Software engineering;
D O I
10.1016/j.future.2016.01.020
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper investigates the current automatics methods used to generate efficient and accurate signatures to create countermeasures against attacks by polymorphic worms. These strategies include autograph, polygraph and Simplified Regular Expression (SRE). They rely on network-based signature detection and filtering content network traffic, as the signature generated by these methods can be read by Intrusion Prevention systems and firewalls. In this paper, we also present the architecture and evaluation of each method, and the implementation used as patterns by SRE mechanism to extract accurate signatures. Such implementation was accomplished through use of the Needleman-Wunsch algorithm, which was inadequate to manage the invariant parts and distances restrictions of the polymorphic worm. Consequently, an Enhanced Contiguous Substring Rewarded (ECSR) algorithm is developed to improve the result extraction from the Needleman-Wunsch algorithm and generate accurate signatures. The signature generation by SRE is found to be more accurate and efficient as it preserves all the important features of polymorphic worms. The evaluation results show that the signature contains conjunctions of tokens, or token subsequence can produce a loss of vital information such as ignoring one byte token or neglecting the restriction distances. Furthermore, the Simplified Regular Expression needs to be updated and accurate when compared with autograph and polygraph methods. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:67 / 77
页数:11
相关论文
共 25 条
[1]  
Aljawarneh Shadi, 2011, Network Security, V2011, P12, DOI 10.1016/S1353-4858(11)70026-5
[2]   Cloud Security Engineering: Avoiding Security Threats the Right Way [J].
Aljawarneh, Shadi .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) :64-70
[3]  
Arce I., 2005, VULNERABILITY
[4]  
Bayoglu B., 2008, POLYMORPHIC WORM DET
[5]   Towards automatic generation of vulnerability-based signatures [J].
Brumley, David ;
Newsome, James ;
Song, Dawn ;
Wang, Hao ;
Jha, Somesh .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :2-+
[6]  
Chang V., 2015, IEEE T COMPUT SERV, V99
[7]   Cloud computing adoption framework: A security framework for business clouds [J].
Chang, Victor ;
Kuo, Yen -Hung ;
Ramachandran, Muthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 :24-41
[8]  
Du Z., 2004, IMPROVEMENT NEEDLEME
[9]  
Gundy M.V., 2007, FEATURE OMISSION VUL
[10]  
Kim H.-A., 2010, PRIVACY PRESERVING D