We propose a novel near real-time method for early detection of worm outbreaks in high-speed Internet backbones. Our method attributes several behavioural properties to individual hosts like ratio of outgoing to incoming traffic, responsiveness and number of connections. These properties are used to group hosts into distinct behaviour classes. We use flow-level (Cisco Net Flow) information exported by the border routers of a Swiss Internet backbone provider (AS559/SWITCH). By tracking the cardinality of each class over time and alarming on fast increases and other significant changes, we can early and reliably detect worm outbreaks. We successfully validated our method with archived flow-level traces of recent major Internet e-mail based worms such as MyDoomA and Sobig.F, and fast spreading network worms like Witty and Blaster. Our method is generic in the sense that it does not require any previous knowledge about the exploits and scanning method used by the worms. It can give a set of suspicious hosts in near real-time that have recently and drastically changed their network behaviour and hence are highly likely to be infected.
[1]
Robert Morris,et al.
Designing a framework for active worm detection on global networks
,
2003,
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[2]
Biswanath Mukherjee,et al.
A network security monitor
,
1990,
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3]
Bernhard Plattner,et al.
Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone
,
2005,
DIMVA.
[4]
Hakim Weatherspoon,et al.
Netbait: a Distributed Worm Detection Service
,
2003
.