期刊文献+

算法生成恶意域名的实时检测 被引量:1

Real Time Detect Of Algorithmically Generated Malicious Domain
下载PDF
导出
摘要 当前对算法生成域名技术的检测,检测所用时间周期过长,无法对算法生成的恶意域名进行快速检测。针对此问题,本文基于新增域名与已分类恶意域名之间的关联关系,提出一种算法生成域名的实时检测方法,并在某省运营商DNS服务器机房部署本系统,实验验证本检测方法。实验表明与已有方法相比,本方法能够快速筛选用于恶意网络行为的算法生成域名。但本方法需要消耗大量的计算资源和内存资源,需要在后续的工作中研究解决。 Abstra ct:The current detection of algorithmically generated malicious domain has long detecting cy-cle, and has no sufficient use of known and pub-lished malicious domain. Aimed at this problem, we propose a real time detect method based on relation-ship between new domain name and known mali-cious domains combined with live pattern of algo-rithmically generated domains. The experiment result shows that the method can quickly and effectively filter out algorithmically generated domains used by malware, but this method consumes a large amount of computation and memory resources that needs to be solved in the following work.
出处 《现代电信科技》 2013年第7期3-8,共6页 Modern Science & Technology of Telecommunications
基金 国家242信息安全计划基金资助项目(242-2010A009)
关键词 域名生成算法 僵尸网络 算法生成域名 域名变换 domain generation algorithms botnet algorithmically generated domain domain-flux
  • 相关文献

参考文献9

  • 1P Porras,H Saidi,V Yegneswaran. A Foray into Conficker’s Logic and Rendezvous Points[R].SRI INTERNATIONAL,2009.10-11.
  • 2Leder F,Werner T. Know Your Enemy:Containing Conficker[R].The Honeynet Project & Research Alliance,University of Bonn,Ger-many,2009.
  • 3江健,诸葛建伟,段海新,吴建平.僵尸网络机理与防御技术[J].软件学报,2012,23(1):82-96. 被引量:63
  • 4Stone-Gross,B Cova M,Vigna G. Your Botnet is My Botnet:Analysis of ABotnetTakeover [A].2009.635-647.
  • 5Yadav S, Reddy,Ranjan S. Detecting Algorithmically Generated Mali-cious Domain Names[A].New York,USA,2010.48-61.
  • 6Z Zhu,V Yegneswaran,Y Chen. Using failure information analysis to detect enterprise zombies[A].2009.
  • 7Jiang N,Zhang Z. Identifying Suspicious Activities through DNS Failure Graph Analysis[A].2010.144-153.
  • 8Y Jin,E Sharafuddin,Z-L Zhang. Unveiling core networkwide commu-nication patterns through application traffic activity graph decomposition[A].2009.
  • 9Manos Antonakakis,Roberto Perdisci,YacinNadji. From Throw-Away Traffic to Bots:Detecting the Rise of DGA-Based Malware[A].Bellevue,WA,2012.

二级参考文献2

共引文献62

同被引文献2

引证文献1

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部