Sciweavers

ICCCN
2007
IEEE

Containing Hitlist-Based Worms with Polymorphic Signatures

14 years 6 months ago
Containing Hitlist-Based Worms with Polymorphic Signatures
—Worms are a significant threat to network systems, both through resource consumption and malicious activity. This paper examines the spread of a class of hitlist-based worms that attempt to propagate by searching for address book files on the host system and using the host’s mail program to spread to the addresses found. This threat becomes more severe when the worms are assumed to be polymorphic in nature – able to dynamically change their signature to elude capture. Because the method of propagation for these worms is predictable, it is possible to contain their spread through the use of honeytoken email addresses in the client address book. Any e-mail received by the honeytoken address will be immediately recognized as malicious and can therefore be used to flag client machines as infected. This paper provides a complete description of a method to allow for better containment of this class of worms. The results of the proposed method are examined and compared to a previous me...
Theodor Richardson, Chin-Tser Huang
Added 03 Jun 2010
Updated 03 Jun 2010
Type Conference
Year 2007
Where ICCCN
Authors Theodor Richardson, Chin-Tser Huang
Comments (0)