A Survey on Zero-Day Polymorphic Worm Detection Techniques
Title | A Survey on Zero-Day Polymorphic Worm Detection Techniques |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Kaur, R., Singh, M. |
Journal | Communications Surveys Tutorials, IEEE |
Volume | 16 |
Pagination | 1520-1549 |
Date Published | Third |
ISSN | 1553-877X |
Keywords | detection systems, Fingerprinting, Grippers, Internet, Internet security, invasive software, key per infection, Malware, Monitoring, payload encryption, Payloads, Polymorphic worms, security layers, Signature Generation, signature-based defenses, Vectors, Zero-day attacks, zero-day malware, zero-day polymorphic worm detection techniques |
Abstract | Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not only can they exploit unknown vulnerabilities but can also change their own representations on each new infection or can encrypt their payloads using a different key per infection. They have many variations in the signatures of the same worm thus, making their fingerprinting very difficult. Therefore, signature-based defenses and traditional security layers miss these stealthy and persistent threats. This paper provides a detailed survey to outline the research efforts in relation to detection of modern zero-day malware in form of zero-day polymorphic worms. |
DOI | 10.1109/SURV.2014.022714.00160 |
Citation Key | 6766917 |
- payload encryption
- zero-day polymorphic worm detection techniques
- zero-day malware
- Zero-day attacks
- Vectors
- signature-based defenses
- Signature Generation
- security layers
- Polymorphic worms
- Payloads
- detection systems
- Monitoring
- malware
- key per infection
- invasive software
- Internet security
- internet
- Grippers
- Fingerprinting