The Community for Technology Leaders
Computer Security Applications Conference, Annual (2005)
Tucson, Arizona
Dec. 5, 2005 to Dec. 9, 2005
ISSN: 1063-9527
ISBN: 0-7695-2461-3
pp: 371-380
David Whyte , Carleton University, Ottawa, Canada
Paul C. van Oorschot , Carleton University, Ottawa, Canada
Evangelos Kranakis , Carleton University, Ottawa, Canada
Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of some form of human involvement to formulate updated attack signatures. We propose an anomaly-based detection technique detailing a method to detect propagation of scanning worms within individual network cells, thus protecting internal networks from infection by internal clients. Our software implementation indicates that this technique is both accurate and rapid enough to enable automatic containment and suppression of worm propagation within a network cell. Our approach relies on an aggregate anomaly score, derived from the correlation of Address Resolution Protocol (ARP) activity from individual network attached devices. Our preliminary analysis and prototype indicate that this technique can be used to rapidly detect zero-day worms within a very small number of scans.

E. Kranakis, D. Whyte and P. C. Oorschot, "Detecting Intra-enterprise Scanning Worms based on Address Resolution," Computer Security Applications Conference, Annual(ACSAC), Tucson, Arizona, 2005, pp. 371-380.
94 ms
(Ver 3.3 (11022016))