This paper proposes behavioral footprinting, a new dimension of worm profiling based on worm infection sessions. A worm’s infection session contains a number of steps (e.g., for probing, exploitation, and replication) that are exhibited in certain order in every successful worm infection. Behavioral footprinting complements content-based signature by enriching a worm’s profile, which will be used in worm identification, an important task in post worm attack investigation and recovery. We propose an algorithm to extract a worm’s behavioral footprint from the worm’s traffic traces. Our evaluation with a number of real worms and their variants confirms the existence of worms ’ behavioral footprints and demonstrates their effectiveness in worm ...
This paper serves worm defenders’ objective to improve their immunity to future active worms by givi...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
With increasing speed, virulence, and sophistication, selfpropagating worms continue to pose a serio...
With unprecedented speed, virulence, and sophistication, self-propagating worms remain as one of the...
This paper presents a new approach to the automatic detection of worms using behavioral signatures. ...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
This document has been made available through Purdue e-Pubs, a service of the Purdue University Libr...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
Network worms are a major threat to the security of today's Internet-connected hosts and networks. T...
Network worms are a major threat to the security of today's Internet-connected hosts and networks. T...
Network worms present a persistent threat to cyber-security, with novel wormable vulnerabilities bei...
This paper serves worm defenders’ objective to improve their immunity to future active worms by givi...
Abstract — In this paper, we address issues related to the modeling, analysis, and countermeasures o...
This paper serves worm defenders’ objective to improve their immunity to future active worms by givi...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...
With increasing speed, virulence, and sophistication, selfpropagating worms continue to pose a serio...
With unprecedented speed, virulence, and sophistication, self-propagating worms remain as one of the...
This paper presents a new approach to the automatic detection of worms using behavioral signatures. ...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
This document has been made available through Purdue e-Pubs, a service of the Purdue University Libr...
Abstract: Problem statement: A worm is a malicious piece of code that self-propagates, often via net...
AbstractIncreasing threats from worms in the internet continue to be a challenge for current content...
Network worms are a major threat to the security of today's Internet-connected hosts and networks. T...
Network worms are a major threat to the security of today's Internet-connected hosts and networks. T...
Network worms present a persistent threat to cyber-security, with novel wormable vulnerabilities bei...
This paper serves worm defenders’ objective to improve their immunity to future active worms by givi...
Abstract — In this paper, we address issues related to the modeling, analysis, and countermeasures o...
This paper serves worm defenders’ objective to improve their immunity to future active worms by givi...
Since the days of the Morris worm, the spread of malicious code has been the most imminent menace to...
Active worms has been major security threat to the Internet. This is due to the ability of active wo...