A data mining approach for analysis of worm activity through automatic signature generation

  • Authors:
  • Urko Zurutuza;Roberto Uribeetxeberria;Diego Zamboni

  • Affiliations:
  • Mondragon University, Mondragon, Spain;Mondragon University, Mondragon, Spain;IBM Zürich Research Laboratory, Rüschlikon, Switzerland

  • Venue:
  • Proceedings of the 1st ACM workshop on Workshop on AISec
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper proposes a novel framework to automatically discover and analyze traffic generated by computer worms and other anomalous behaviors that interact with a non-solicited traffic monitoring system. Network packets are analyzed by an Intrusion Detection System (IDS), and new signatures are generated clustering those which remain unknown for the IDS. Furthermore, the framework provides a mechanism to cluster the alarms produced by the IDS producing a correlated vision of the traffic observed. Both the automatic signature generation and the alarm clusters are accomplished using data mining techniques.