Network Security and Cryptography |
Foundation of Computer Science USA |
NSC - Number 3 |
December 2011 |
Authors: Reshma R. Patel, Chirag S. Thaker, Hemant B. Patel |
e6d8ea33-9bcb-419b-891c-7dabd8a42de0 |
Reshma R. Patel, Chirag S. Thaker, Hemant B. Patel . Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network. Network Security and Cryptography. NSC, 3 (December 2011), 30-35.
Self-propagating malware, such as worms, have prompted cyber attacks that compromise regular computer systems via exploiting memory-related vulnerabilities which present threats to computer networks. A new generation worm could infect millions of hosts in just a few minutes, making on time human intrusion impossible. The new worms are spread over the network on regular basis and the computer systems and network vulnerabilities are growing enormously. Here we also facing the problem of automatically and reliably detecting previously unknown attacks which are known as zero-day attack.In this paper, I have described the use of the Honeycomb to detect Zero-day attack in Virtualized network. A method to automatically generate signatures using the proposed detection system is presented. The attack signatures are detected and scanned through the system. Honeycomb is a host-based intrusion detection system that automatically creates signatures. It uses a honeypot to capture malicious traffic targeting dark space, and then applies the Longest Common Substring (LCS) algorithm on the packet content of a number of connections going to the same services. The computed substring is used as candidate worm signature. Honeycomb is well suited for extracting string signatures for automated updates to a firewall.