通信学报 ›› 2013, Vol. 34 ›› Issue (3): 141-147.doi: 10.3969/j.issn.1000-436x.2013.03.018

• 技术报告 • 上一篇    下一篇

蠕虫正则表达式特征自动提取技术研究

唐勇1,诸葛建伟2,陈曙晖1,卢锡城1   

  1. 1 国防科技大学 计算机学院,湖南 长沙 410073
    2 清华大学 信息网络工程研究中心 ,北京100084
  • 出版日期:2013-03-25 发布日期:2017-07-20
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目

Automatic generating regular expression signatures for real network worms

Yong TANG1,Jian-wei ZHUGE2,Shu-hui CHEN1,Xi-cheng LU1   

  1. 1 College of Computer, National University of Defense Technology, Changsha 410073,China
    2 Network Research Center of Tsinghua University, Beijing 100084,China
  • Online:2013-03-25 Published:2017-07-20
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program);The National Natural Science Foundation of China;The National Natural Science Foundation of China

摘要:

提出一种实用的蠕虫正则表达式特征自动提取方法,该方法由蠕虫传播网络流样本获取、特征树生成、高假阳性特征剔除、特征融合这4步组成。该方法的优点是可输出具有强描述能力的包含“.*”、“.{k}”、“|”、“(c){k}”等元字符的正则表达式特征。基于蜜罐系统(Honeybow)实现了该方法,并针对互联网上数种真实蠕虫进行了实验。实验结果表明,该方法可以准确地提取真实蠕虫的正则表达式特征,可以在蜜罐、蠕虫及恶意代码分析等系统中应用。

关键词: 蠕虫, 恶意代码, 特征提取, 特征树, 正则表达式, 蜜罐, 入侵检测

Abstract:

A practical worm regular expression of automatic extraction method was presented,which involves four steps:sample collection from worm propagation, signature tre generation, removal of high false-positive signatures, and sig-nature merging. The advantage of this method is that it can directly output expression signature with the rich syntax of“.*”, “.{k}”, “|”, “(c){k}”. Based on the honeypot system Honeybow deployed in Internet, the method was implemented and evaluated by several in-wild worms under real Internet environment. The experiment results show that the method can generate accurate regular expression signatures for real worms and is promising for the applications of automatic analysis of worms and malwares.

Key words: worm, malware, signature generation, signature tree, regular expression, honeybow, intrusion detection

No Suggested Reading articles found!