Detecting worm variants using machine learning

  • Authors:
  • Oliver Sharma;Mark Girolami;Joseph Sventek

  • Affiliations:
  • University of Glasgow, United Kingdom;University of Glasgow, United Kingdom;University of Glasgow, United Kingdom

  • Venue:
  • CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until the signatures are created, but that variants of known worms will remain undetected since they will have different signatures. The intuitive solution is to write more generic signatures. This solution, however, would increase the false alarm rate and is therefore practically not feasible. This paper reports on the feasibility of using a machine learning technique to detect variants of known worms in real-time. Support vector machines (SVMs) are a machine learning technique known to perform well at various pattern recognition tasks, such as text categorization and handwritten digit recognition. Given the efficacy of SVMs in standard pattern recognition problems this work applies SVMs to the worm detection problem. Specifically, we investigate the optimal configuration of SVMs and associated kernel functions to classify various types of synthetically generated worms. We demonstrate that the optimal configuration for real time detection of variants of known worms is to use a linear kernel, and unnormalized bi-gram frequency counts as input.