search menu icon-carat-right cmu-wordmark

Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs

White Paper
In this paper, the authors present a novel method for detecting hit-list worms using protocol graphs.
Publisher

Software Engineering Institute

Abstract

We present a novel method for detecting hit-list worms using protocol graphs. In a protocol graph, a vertex represents a single IP address, and an edge represents communications between those addresses using a specific protocol (e.g., HTTP). We show that the protocol graphs of four diverse and representative protocols (HTTP, FTP, SMTP, and Oracle), as constructed from monitoring for fixed durations on a large intercontinental network, exhibit stable graph sizes and largest connected component sizes. Moreover, we demonstrate that worm propagations, even of a sophisticated hit-list variety in which the attacker has advance knowledge of his targets and always connects successfully, perturb these properties. We demonstrate that these properties can be monitored very efficiently even in very large networks, giving rise to a viable and novel approach for worm detection. We also demonstrate extensions by which the attacking hosts (bots) can be identified with high accuracy.

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.