International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 36 - Number 2 |
Year of Publication: 2011 |
Authors: Shubair A. Abdulla, Sureswara Ramadass, Altyeb Altaher, Amer Al Nassiri |
10.5120/4467-6258 |
Shubair A. Abdulla, Sureswara Ramadass, Altyeb Altaher, Amer Al Nassiri . Setting a Worm Attack Warning by using Machine Learning to Classify NetFlow Data. International Journal of Computer Applications. 36, 2 ( December 2011), 49-56. DOI=10.5120/4467-6258
We present a worm warning system that leverages the reliability of IP-Flow and the effectiveness of machine learning techniques. Our system aims at setting an alarm in case a node is behaving maliciously. Typically, a host infected by a scanning or an email worm initiates a significant amount of traffic that does not rely on DNS to translate names into numeric IP addresses. Based on this fact, we capture and classify NetFlow records to extract features that uniquely identify worm's flow. The features are encapsulated into a set of feature patterns to train the support vector machines (SVM). A feature pattern includes: no of DNS requests, no of DNS responses, no of DNS normals, and no of DNS anomalies, for each PC on the network within a certain period of time. The SVM training is performed by using five of the most dangerous scanning worms: CodeRed, Slammer, Sasser, Witty, and Doomjuice as well as five email worms: Sobig, NetSky, MyDoom, Storm and Conficker. Eleven worms have been used during the test: Welchia, Dabber, BlueCode, Myfip, Nimda, Sober, Bagle, Francette, Sasser, MyDoom, and Conficker. The results of experiments manifest the soundness of the worm warning system.