Skip to main content

Defense Strategy against Network Worms Causing ICMP Attacks and Its Forensic Analysis

  • Conference paper
Advances in Network Security and Applications (CNSA 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 196))

Included in the following conference series:

  • 2360 Accesses

Abstract

The network forensic analysis process involves preparation, collection, preservation, examination, analysis, investigation and presentation phases. The proposed system addresses the major challenges in collection, examination and analysis processes. The model is for collecting network data, identifying suspicious packets, examining protocol features misused and validating the attack. This model has been built with specific reference to security attacks on ICMP protocol that enables forensic experts to analyze the marked suspicious network traffic, thus facilitating cost effective storage and faster analysis of high bandwidth traffic. The ICMP attacks initiated by worms can be detected using this system. The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. Thus worm detection has become a vital part in the Intrusion Detection Systems. A reaction mechanism that seeks to automatically patch vulnerable software is also proposed. This system employs a collection of sensors that detect and capture potential worm infection vectors. The size of the log file generated by different sensors, used for detecting worm infection vectors can be efficiently reduced by the forensic architecture. It automatically tests the effects of these vectors on appropriately-instrumented sandboxed instances of the targeted application, trying to identify the exploited software weakness. Network forensics relates to the monitoring and analysis of computer network traffic for the purpose of information gathering, legal evidence or intrusion detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sidiroglou, S., Locasto, M.E., Keromytis, A.D.: Self healing software services. In: Workshop on Architectural Support for Security and Anti-Virus, vol. 33(1) (2008)

    Google Scholar 

  2. Sidiroglou, S., Keromytis, A.D.: A NetworkWorm Vaccine Architecture. In: Proceedings of the Proceeding WETICE 2003 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (2004)

    Google Scholar 

  3. Einwechter, N.: Identifying and Tracking Emerging and Subversive Worms Using Distributed Intrusion Detection Systems, SecurityFocus.com

    Google Scholar 

  4. Hong, S.-C., Zhao, L.-Q., Ju, H.-T., Hong, J.W.: Worm Traffic Monitoring and Infected Hosts Detection Algorithm for Local Network. In: Proceedings of 10th ACM Conference on Computer and Communications Security(CCS 2003), pp. 190–199 (2003)

    Google Scholar 

  5. Nazario, J.: Defense and Detection Strategies against Internet Worms. Artech House, Boston (2004) ISBN 1-58053-537-2

    Google Scholar 

  6. Zamboni, D., Riordan, J., Yates, M.: Boundary detection and containment of local worm infections. In: Proceedings of the 18th Annual FIRST Conference (2007)

    Google Scholar 

  7. Karthik, S., Samudrala, B., Yang, A.T.: Design of Network Security Projects Using Honeypots. Journal of Computing Sciences in Colleges 20(4)

    Google Scholar 

  8. Yasinsac, A., Manzano: Policies to Enhance Computer and Network Forensics. In: IEEE Workshop on Information Assurance and Security (2001)

    Google Scholar 

  9. Kaushik, A.K., Joshi, R.C.: Network Forensic System for ICMP Attacks. International Journal of Computer Applications 2(3), 975–8887 (2010)

    Article  Google Scholar 

  10. Almulhem, A., Traore: Experience with Engineering a Network Forensics System. In: Proceedings of International Conference on Information Networking (2005)

    Google Scholar 

  11. Kumar, S.: Smurf-based Distributed Denial of Service(DDoS) Attack Amplification in Internet. In: Proceedings of International Conference on Internet Monitoring and Protection (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Aathira, K.S., Kutty, T.N. (2011). Defense Strategy against Network Worms Causing ICMP Attacks and Its Forensic Analysis. In: Wyld, D.C., Wozniak, M., Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Advances in Network Security and Applications. CNSA 2011. Communications in Computer and Information Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22540-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22540-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22539-0

  • Online ISBN: 978-3-642-22540-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics