Signature-based schemes for detecting Internet worms often fail on zero-day worms, and their ability to rapidly react to new threats is typically limited by the requirement of some form of human involvement to formulate updated attack signatures. We propose an anomaly-based detection technique detailing a method to detect propagation of scanning worms within individual network cells, thus protecting internal networks from infection by internal clients. Our software implementation indicates that this technique is both accurate and rapid enough to enable automatic containment and suppression of worm propagation within a network cell. Our approach relies on an aggregate anomaly score, derived from the correlation of Address Resolution Protocol (ARP) activity from individual network attached devices. Our preliminary analysis and prototype indicate that this technique can be used to rapidly detect zero-day worms within a very small number of scans.
21st Annual Computer Security Applications Conference, ACSAC 2005
School of Computer Science

Whyte, D. (David), Van Oorschot, P, & Kranakis, E. (2005). Detecting intra-enterprise scanning worms based on address resolution. Presented at the 21st Annual Computer Security Applications Conference, ACSAC 2005. doi:10.1109/CSAC.2005.20