Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts

  • Authors:
  • Shad Stafford; Jun Li;Toby Ehrenkranz

  • Affiliations:
  • Department of Computer Science University of OregonEugene OR 97403-1202, USA;Department of Computer Science University of OregonEugene OR 97403-1202, USA;Department of Computer Science University of OregonEugene OR 97403-1202, USA

  • Venue:
  • Simulation
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Once a host is infected by an Internet worm, prompt action must be taken before that host does more harm to its local network and the rest of the Internet. It is therefore critical to quickly detect that a worm has infected a host. In this paper, we enhance our SWORD system to allow for the detection of infected hosts and evaluate its performance. This enhanced version of SWORD inherits the advantages of the original SWORD: it does not rely on inspecting traffic payloads to search for worm byte patterns or setting up a honeypot to lure worm traffic. Furthermore, while acting as a host-level detection system, it runs at a network's gateway and stays transparent to individual hosts. We show that our enhanced SWORD system is able to quickly and accurately detect if a host is infected by a zero-day worm. Furthermore, the detection is shown to be effective against worms of different types and speeds, including polymorphic worms