We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with counters. The system analyzes traffic in routers of a network. Our preliminary evaluation of the system involved traffic from our internal lab and a well known historical data set. After appropriate configuration, no false alarms are obtained under these data sets and we expect low false alarm rates are possible in many network environments. We also conduct simulations using real Internet Service Provider topologies with realistic link delays and simulated traffic. These simulations confirm that this approach can detect worms at early stages of propagation. We believe our approach, with minor adaptations, is of independent interest for use in a number of network applications which benefit from detecting repeated packets, beyond detecting worm propagation. These include detecting network anomalies such as dangerous traffic fluctuations, abusive use of certain services, and some distributed denial-of-service attacks.

Additional Metadata
Keywords Anomaly detection, Computer worms, Intrusion detection, Network security, Traffic monitoring
Persistent URL dx.doi.org/10.1007/s10207-006-0081-8
Journal International Journal of Information Security
Van Oorschot, P, Robert, J.-M. (Jean-Marc), & Martin, M.V. (Miguel Vargas). (2006). A monitoring system for detecting repeated packets with applications to computer worms. International Journal of Information Security, 5(3), 186–199. doi:10.1007/s10207-006-0081-8