Security

Modeling and Detection of Camouflaging Worm Using IP Traceback

Free registration required

Executive Summary

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. A new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is different from traditional worms because of its ability to intelligently manipulate its scan traffic volume over time. Thereby, the C-Worm camouflages its propagation from existing worm detection systems based on analyzing the propagation traffic generated by worms. The characteristics of the C-Worm and conduct a comprehensive comparison between its traffic and non-worm traffic (background traffic).

  • Format: PDF
  • Size: 998.8 KB