Dec. 5, 2005 to Dec. 9, 2005
David Whyte , Carleton University, Ottawa, Canada
Paul C. van Oorschot , Carleton University, Ottawa, Canada
Evangelos Kranakis , Carleton University, Ottawa, Canada
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/CSAC.2005.20
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of some form of human involvement to formulate updated attack signatures. We propose an anomaly-based detection technique detailing a method to detect propagation of scanning worms within individual network cells, thus protecting internal networks from infection by internal clients. Our software implementation indicates that this technique is both accurate and rapid enough to enable automatic containment and suppression of worm propagation within a network cell. Our approach relies on an aggregate anomaly score, derived from the correlation of Address Resolution Protocol (ARP) activity from individual network attached devices. Our preliminary analysis and prototype indicate that this technique can be used to rapidly detect zero-day worms within a very small number of scans.
David Whyte, Paul C. van Oorschot, Evangelos Kranakis, "Detecting Intra-enterprise Scanning Worms based on Address Resolution", ACSAC, 2005, Computer Security Applications Conference, Annual, Computer Security Applications Conference, Annual 2005, pp. 371-380, doi:10.1109/CSAC.2005.20