期刊文献+

基于对等网络的蠕虫检测系统

Worm detection system based on P2P networks
原文传递
导出
摘要 针对传统基于互联网的蠕虫检测手段并不完全适应对等网络环境下的蠕虫防御问题,在充分研究现有的网络蠕虫检测技术和综合借鉴当前较为先进的蠕虫检测算法的基础之上,提出了一种基于对等网络的蠕虫检测系统,结合P2P蠕虫的传播特点,从3个层次和多个角度对P2P蠕虫进行快速检测,多重防御,及时预警并尽可能地降低预警的误报率和漏报率,本系统能为后续的蠕虫防御提供一定的参考. 针对传统基于互联网的蠕虫检测手段并不完全适应对等网络环境下的蠕虫防御问题,在充分研究现有的网络蠕虫检测技术和综合借鉴当前较为先进的蠕虫检测算法的基础之上,提出了一种基于对等网络的蠕虫检测系统,结合P2P蠕虫的传播特点,从3个层次和多个角度对P2P蠕虫进行快速检测,多重防御,及时预警并尽可能地降低预警的误报率和漏报率,本系统能为后续的蠕虫防御提供一定的参考.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第S1期230-235,共6页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家科技重大专项资助项目(2011ZX03002-004-03) 重庆市高等教育成果转化项目(Kjzh10206) 公安部信息网络安全重点实验室资助项目(C11609)
关键词 蠕虫检测 对等网络 P2P蠕虫 误报率 漏报率 worm detection peer-to-peer networks P2P worm false positive rate false negative rate
  • 相关文献

参考文献25

  • 1赵礼,李朝阳.一种基于Netflow的蠕虫攻击检测方法研究[J].信息安全与通信保密,2012,10(6):53-55. 被引量:2
  • 2王平,方滨兴,云晓春,彭大伟.基于用户习惯的蠕虫的早期发现[J].通信学报,2006,27(2):56-65. 被引量:9
  • 3Kim H-A,Karp B.Autograph: Toward Automated, Distributed Worm Signature Detection. 13th USENIX Security Symposium . 2004
  • 4Niels P.A virtual honeypot framework. 13thUSENIX Security Symposium . 2003
  • 5Daniel R Ellis,John G.Aiken,Kira S.Attwood,Scott D.Tenaglia.A Behavioral Approach to Worm Detection. ACM Workshop on Rapid Malcode(WORM 2004 ) . October292004
  • 6JIANG Xuxian,XU Dongyan.Profiling self-propagating wormsvia behavioral footprinting. ACM Workshop On RecurringMalcode(WORM) . 2006
  • 7Chen Y,Narayanan A,Pang S N,et al.Malicioussoftware detection using multiple sequence align-ment and data mining. Advanced InformationNetworking and Applications (AINA),IEEE 26thInternational Conference . 2012
  • 8Santiago-Paz J,Torres-Roman D,Velarde-AlvaradoP.Detecting anomalies in network traffic using en-tropy and Mahalanobis distance. ElectricalCommunications and Computers (CONIELE-COMP) . 2012
  • 9Fahimian S,Movahed A,Kharrazi M.Passiveworm and malware detection in peer-to-peer net-works. Embedded and Ubiquitous Computing (EUC),2010IEEE/IFIP 8th International Confer-ence . 2010
  • 10C.-Y. Ho,Y.-C. Lai,I-W. Chen,F.-Y. Wang,W.-H. Tai."Statistical analysis of false positives and faluse negatives from real traffic with intrusion detection/prevention systems,". IEEE Communications Magazine . 2012

二级参考文献20

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2陈鸣,许博.一种基于NetFlow的网络蠕虫检测算法[J].解放军理工大学学报(自然科学版),2006,7(4):336-340. 被引量:2
  • 3何丰,靳娜.基于NetFlow的IP网络状态监测系统的设计与实现[J].通信技术,2007,40(8):34-36. 被引量:7
  • 4FULLMER Mark. Flow-tools Man Pages[EB/OL]. (2005-5-1l). http: //www.splintered.net/sw/flow-tools/docs/.
  • 5Computer Economics,2001 economic impact of Malicious code attacks[EB/OL].http://www.computereconomics.com/cei/press/pr92101.html,2001.
  • 6MOORE D,PAXSON V,SAVAGE S,et al.Inside the slammer worm[J].IEEE Magazine of Security and Privacy,2003,1(4):33-39.
  • 7BERK V H,GRAY R S,BAKOS G.Using sensor networks and data fusion for early detection of active worms[A].Proc of the SPIE AeroSense[C].2003.
  • 8ZOU C C,GAO L X,GONG W B,et al.Monitoring and early warning for intemet worms[A].Proceedings of the 10th ACM Conference on Computer and Communication Security[C].2003.
  • 9MORRISON.Honeypot technology[EB/OL].http://www.xfocus.net/articles/200103/121.html,2001.
  • 10HARDER U,JOHNSON M J,BRADLEY J T,et al.Observing internet worm and virus attacks with a small network telescope[A].PASM'05,Proceedings of the 2nd Workshop on Practical Applications of Stochastic Modelling[C].Newcastle:Njgel Thomas(Ed),2005.113-126.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部