期刊文献+

一种基于分层聚类方法的木马通信行为检测模型 被引量:12

A Model of Trojan Communication Behavior Detection Based on Hierarchical Clustering Technique
下载PDF
导出
摘要 木马是互联网安全最严重的威胁之一.现有的木马检测方法主要受到3个方面的限制:1)无法检测新出现的木马实例;2)必须随着木马的改变实时地更新;3)消耗了大量的计算资源.针对上述情况,这里从网络层和传输层两个层面分析了木马的网络通信行为,并提取了能够有效描述其网络行为的4个特征.然后采用分层聚类方法建立了木马通信检测模型,并利用实际的网络流量数据进行了评估.实验结果显示,该模型具有较高的准确率和较低的误报率,很好地验证了检测模型的有效性. 木马是互联网安全最严重的威胁之一.现有的木马检测方法主要受到3个方面的限制:1)无法检测新出现的木马实例;2)必须随着木马的改变实时地更新;3)消耗了大量的计算资源.针对上述情况,这里从网络层和传输层两个层面分析了木马的网络通信行为,并提取了能够有效描述其网络行为的4个特征.然后采用分层聚类方法建立了木马通信检测模型,并利用实际的网络流量数据进行了评估.实验结果显示,该模型具有较高的准确率和较低的误报率,很好地验证了检测模型的有效性.
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第S2期9-16,共8页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61070185 61003261)
关键词 木马通信检测 分层聚类 网络行为 网络安全 Trojan communication detection hierarchical cluster network behavior network security
  • 相关文献

参考文献25

  • 1方滨兴,崔翔,王威.僵尸网络综述[J].计算机研究与发展,2011,48(8):1315-1331. 被引量:63
  • 2AsSadhan B,Moura J M F,Lapsley D.Periodic behavior in botnet command and control channels traffic. Proc of IEEE GLOBECOM . 2009
  • 3Levine J,Culver B,Owen H.A methodology for detecting new binary rootkit exploits. Proc of IEEE SoutheastCon2003 . 2003
  • 4Myers A,Nystrom N,Zheng L et al.Jif:Java information flow. http://www.cs.cornell.edu/jif . 2001
  • 5Gartner.Use network behavior analysis for better visibility into security and operations events. . 2005
  • 6Martin Roesch.Snort - Lightweight Intrusion Detection for Networks. Proc of the 13th Conference on Systems Administration . 1999
  • 7Guofei Gu,,Junjie Zhang,Wenke Lee.BotSniffer:Detecting Botnet Command and Control Channels in Network Traffic. Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS’’08) . 2008
  • 8Kevin Borders,Atul Prakash.Quantifying information leaks in outbound web trace. IEEE Symposium on Security & Privacy . 2009
  • 9Thimbleby H,Anderson S,Cairns P.A framework for modeling Trojans and computer virus infection. Computer Journal . 1998
  • 10Bergeron J,Debbabi M,Desharnais J,Erhioui M M,Lavoie Y,Tawbi N.Static detection of malicious code in executable programs. Symposium on Requirements Engineering for Information Security . 2001

二级参考文献62

  • 1Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 2CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 3Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 4Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 5Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 6Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 7Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.
  • 8Holz T, Steiner M, Dahl F, et al. Measurements an mitigation of peer-to peer-based botnets:A case study o storm worm [C] //Proc of the 1st USENIX Workshop o Large-scale Exploits and Emergent Threats. Berkeley, CA USENIX, 2008: No 9.
  • 9Kanich C, Levchenko K, Enright B, et al. The Heisenbot uncertainty problem: Challenges in separating bots from chaff [C] //Proc of the 1st USENIX Workshop on Large- Scale Exploits and Emergent Threats. Berkeley, CA: USENIX, 2008:1-9.
  • 10Ramaehandran A, Feamster N. Understanding the networklevel behavior of spammers[C] //Proe of the 2006 Conf on Applications, Technologies, Architectures and Protocols for Computer Communications. New York: ACM, 2006: 291- 302.

共引文献62

同被引文献83

引证文献12

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部