Scanning worm detection with ARP anomaly in local area network

  • Jianwei Sun*
  • , Junkai Yi
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Local area network (LAN) is usually partitioned into multiple Virtual LANs (VLAN). A scanning worm targeting systems within its own VLAN exhibits anomalous behavior distinct from normal Address Resolution Protocol (ARP) activity. The paper proposes an anomaly-based detection technique based on the ARP activities of individual host to detect propagation of scanning worms. Our experiments indicate that this technique is both accurate and rapid to detect and contain the worm propagation in LAN.

Original languageEnglish
Title of host publicationProceedings of the Fifth IASTED International Conference on Communications, Internet, and Information Technology, CIIT 2006
Pages155-159
Number of pages5
Publication statusPublished - 2006
Externally publishedYes
Event5th IASTED International Conference on Communications, Internet, and Information Technology, CIIT 2006 - St. Thomas, US Virgin Islands, United States
Duration: 29 Nov 20061 Dec 2006

Publication series

NameProceedings of the Fifth IASTED International Conference on Communications, Internet, and Information Technology, CIIT 2006

Conference

Conference5th IASTED International Conference on Communications, Internet, and Information Technology, CIIT 2006
Country/TerritoryUnited States
CitySt. Thomas, US Virgin Islands
Period29/11/061/12/06

Keywords

  • Address Resolution Protocol (ARP)
  • Anomaly detection
  • Scanning worm

Fingerprint

Dive into the research topics of 'Scanning worm detection with ARP anomaly in local area network'. Together they form a unique fingerprint.

Cite this