The Community for Technology Leaders
Fuzzy Systems and Knowledge Discovery, Fourth International Conference on (2008)
Oct. 18, 2008 to Oct. 20, 2008
ISBN: 978-0-7695-3305-6
pp: 327-331
Recent worm increasingly threaten the availability of Internet. It is difficult to catch variety of 0day worms promptly with current signature matching approach because most signatures are developed manually. Several recent efforts to automatically extract worm signatures from Internet traffic have been done, but the efficiency is an unsolved problem especially in real high-speed network. We propose a binary clustering algorithm and a leaves preferred policy to improve the front traffic filter, which can reduce the traffic to be processed and enhance its purity. A position-aware signature generation method based bloom filter is proposed to bring better performance and more accurate signature for content-based defense. Both trace data and tcp dump data are used to test the prototype system and experiment results show the system can efficiently filter through suspicious traffic with high purity, which is no more than 25% of entire traffic, and extract more accurate signature, which can well support popular defense system such as Snort.

B. Liu, H. Tu and Z. Li, "Mining Network Traffic for Worm Signature Extraction," 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Shandong, 2008, pp. 327-331.
87 ms
(Ver 3.3 (11022016))