skip to main content
10.1145/1370905.1370911acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

LISABETH: automated content-based signature generator for zero-day polymorphic worms

Published:17 May 2008Publication History

ABSTRACT

Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically produce signature for polymorphic worms, required by Intrusion Detection Systems. However, polymorphic worms are more complex than non-mutating ones as they also require the identification of mutated instances. To this end, we propose Lisabeth, our improved version of Hamsa, an automated content-based signature generation system for polymorphic worms that uses invariant bytes analysis of network traffic content. We show an unknown attack to Hamsa's signature generator that is contrasted by Lisabeth. Moreover, we show that our approach is able to generally improve the resilience to poisoning attacks as supported by our experiments with synthetic polymorphic worms.

References

  1. Aleg Kolesnikov and Wenke Lee. Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic. Technical report, Georgia Tech College of Computing, 2004.Google ScholarGoogle Scholar
  2. C. Kruegel, E. Kirda, D. Mutz, W. Robertson and G. Vigna. Polymorphic Worm Detection Using Structural Information of Executables. In Proc. of the International Symposium on Recent Advances in Intrusion Detection (RAID), volume 3858 of LNCS, pages 207--226, Seattle, WA, September 2005. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Christian Collberg, Clark Thomborson and Douglas Low. A Taxonomy of Obfuscating Transformations. Technical Report 148, July 1997.Google ScholarGoogle Scholar
  4. Christian Kreibich and Jon Crowcroft. Honeycomb -- Creating Intrusion Detection Signatures Using Honeypots. In Proc. of the Second Workshop on Hot Topics in Networks (Hotnets II), Boston, November 2003.Google ScholarGoogle Scholar
  5. Cliff Changchun Zou, Lixin Gao, Weibo Gong and Don Towsley. Monitoring and early warning for internet worms. In Proc. of the 10th ACM conference on Computer and communications security, pages 190--199, Washington D.C., USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Moore, C. Shannon, G. Voelker and S. Savage. Internet Quarantine: Requirements for Containing Self-Propagating Code. In Proc. of INFOCOM 2003, April 2003.Google ScholarGoogle ScholarCross RefCross Ref
  7. Frederic Raynal. Malicious Cryptography, May 2006.Google ScholarGoogle Scholar
  8. Hyang-Ah Kim and Brad Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Proc. of the USENIX Security Conference, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. James Newsome. Polygraph. {Online; last access 2007 january 28}.Google ScholarGoogle Scholar
  10. James Newsome and Dawn Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In The 12th Annual Network and Distributed System Security Symposium, February 2005.Google ScholarGoogle Scholar
  11. James Newsome, Brad Karp and Dawn Song. Polygraph: Automatically generating signatures for polymorphic worms. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. James Newsome, Brad Karp and Dawn Song. Paragraph: Thwarting Signature Learning by Training Maliciously. In Proc. of the Ninth International Symposium on Recent Advances in Intrusion Detection (RAID 2006), Hamburg, Germany, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jose Nazario. Defense and Detection Strategies against Internet Worms. Artech House, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Martin Roesch. Snort -- Lightweight Intrusion Detection for Networks. In LISA '99: Proceedings of the 13th USENIX conference on System administration, pages 229--238, Berkeley, CA, USA, 1999. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Mihai Christodorescu and Somesh Jha. Static Analysis of Executables to Detect Malicious Patterns. In Proceedings of the 12th USENIX Security Symposium (Security'03), pages 169--186, Washington, DC, USA, August 2003. USENIX Association, USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song and Randal E. Bryant. Semantics-Aware Malware Detection. In Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 32--46, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Peter Ferrie and Frederic Perriot. Detecting Complex Viruses, December 2004.Google ScholarGoogle Scholar
  18. Peter Szor and Peter Ferrie. Hunting for Metamorphic. In Virus Bulletin Conference, September 2001.Google ScholarGoogle Scholar
  19. Roberto Perdisci, David Dagon, Wenke Lee, Prahlad Fogla and Monirul Sharif. Misleading Worm Signature Generators Using Deliberate Noise Injection. In Proc. of the 2006 IEEE Symposium on Security and Privacy (S&P'06), Washington, DC, USA, 2006. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Stefan Axelson. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report 99--15, Chalmers University of Technology Department of Computer Engineering, G¨teborg, Sweden, March 2000.Google ScholarGoogle Scholar
  21. Stuart Staniford, Vern Paxson and Nicholas Weaver. How to Own the Internet in Your Spare Time. In Proc. of the 11th USENIX Security Symposium, Oakland, CA, August 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage. Automated Worm Fingerprinting. In Proc. of Symposium on Operating Systems Design and Implementation (OSDI), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory efficient string matching algorithms fo intrusion detection.Google ScholarGoogle Scholar
  24. Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Proc. of the 7th USENIX Security Symposium, San Antonio, Texas, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Zhichun Li, Manan Sanghi, Yan Chen, Ming-Yang Kao and Brian Chavez. Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resilience. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LISABETH: automated content-based signature generator for zero-day polymorphic worms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SESS '08: Proceedings of the fourth international workshop on Software engineering for secure systems
        May 2008
        72 pages
        ISBN:9781605580425
        DOI:10.1145/1370905
        • Program Chairs:
        • Bart De Win,
        • Seok-Won Lee,
        • Mattia Monga

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 May 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate8of11submissions,73%

        Upcoming Conference

        ICSE 2025

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader