International Conference on Computer Communication and Networks CSI-COMNET-2011 |
Foundation of Computer Science USA |
COMNET - Number 1 |
Decmber 2011 |
Authors: Reshma R. Patel, Chirag S. Thaker |
1de23283-dfe3-459a-b1cf-95583f49cafe |
Reshma R. Patel, Chirag S. Thaker . Zero-Day Attack Signatures Detection Using Honeypot. International Conference on Computer Communication and Networks CSI-COMNET-2011. COMNET, 1 (Decmber 2011), 79-85.
Self-propagating malware, such as worms, have prompted cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities which present threats to computer networks . A new generation worm could infect millions of hosts in just a few minutes, making on time human intrusion impossible. The new worms are spread over the network on regular basis and the computer systems and network vulnerabilities are growing enormously. Here we also facing the problem of automatically and reliably detecting previously unknown attacks which are known as zero-day attack.In this paper, I have described the use of the Honeypot to detect Zero-day attack in computer network. This paper addresses the problem of automatically and reliably detecting previously unknown attacks, and generating solutions that can prevent new infections in their early stages. A method to automatically generate signatures using the proposed detection system is presented. The attack signatures are detected and scanned through the system. Honeycomb is a host-based intrusion detection system that automatically creates signatures. It uses a honeypot to capture malicious traffic targeting dark space, and then applies the Longest Common Substring (LCS) algorithm on the packet content of a number of connections going to the same services. The computed substring is used as candidate worm signature. Honeycomb is well suited for extracting string signatures for automated updates to a firewall.