期刊文献+

网络蠕虫爆发的检测算法及其应用 被引量:2

Detection algorithm of internet worm eruption and its application
下载PDF
导出
摘要 新一代的网络蠕虫融合了病毒、木马、DDOS攻击等各种攻击手段,一旦爆发,将迅速导致大规模的网络阻塞甚至瘫痪。提出了一种蠕虫爆发检测算法,通过对网络流量变化率的监测,可以在蠕虫爆发的前期发现网络异常,从而使网络管理员和应急响应组织获得更多的反应时间,在蠕虫阻塞网络之前采取措施。算法使用DARPA98入侵检测评估系统进行了评估,并应用于Blaster、Nachi、slammer和Sasser蠕虫爆发时的真实数据。 New internet worm including many attack measures, such as virus, trojan and DDDS, will cause network block even paralysis, when it breaks out. A detection algorithm is brought forward which can find abnormity in the forepart of worm eruption by detection on variable rate of network flux, and then network administrators and emergency response teams can gain more time to take measures before worm blocks the network. This algorithm is evaluatedby DARPA98 intrusion detection evaluation system and has applied to real flux data of worm (Blaster、Nachi、slammer) eruption.
出处 《计算机工程与设计》 CSCD 北大核心 2005年第5期1140-1143,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60203004)
关键词 网络蠕虫 入侵检测 异常检测 蠕虫爆发检测算法 internet worm intrusion detection anomaly detection
  • 相关文献

参考文献12

  • 1CERT/CC.CERT^@ Advisory CA一2001-23 continued threat of the“code red”worm[EB/OL].2001-07—26.http://www.cert.ore,/advisories/CA.2001.23.html.
  • 2Roger A Grimes.Malicious mobile code[M].Sebastopol,CA:O’Reilly&Associates.2001.2-3.
  • 3CERT/CC.CERT^@ Advisory CA一2003—04 MS—SQL server worm[EB/OL].2003—01—25.http:llwww.cert.org/advisories/CA一2003—04.html,January 25.
  • 4Joao B D Cabrera,Ravichandran B,Raman K.Mehra.statistical traffic modeling for network intrusion detection[C].IEEE,2000.
  • 5Cabrera J B D,Ravichandran B,Mehra R K.Data classification and data clustering algorithms for intrusion detection on computer networks[R].Technical Report AFRL—IS—TR一2000.5 1,Air Force Research Laboratory,Information Directorate,Rome,NY2000.
  • 6Moore D,Shannon C,Voelker G M.Intemet.quarantine:requirements for containing self-propagating code[C].Proc of IEEE INFOCOM’,2003.
  • 7Graf I,Lippmarm R,Cunningham R,et a1.Results of DARPA 1998 offline intrusion detection evaluation[EB/OL].DARPA PI Meeting slides.1998-12.http://www.acki.ore,/floyd/papers.html.
  • 8Kendall K.A database of computer attacks for the evaluation of intrusion detection systems[D].Master’s thesis,Massachusetts Institute of Technology,1999.
  • 9Lippmarm R P,Cunningham R,Fried D,et a1.MIT lincoln lavoratory offline component of DARPA 1998[EB/OL].DARPA PI Meeting slides.http://ideval.11.mit.edu.
  • 10CERT/CC.CERT advisory CA一2003—20 W32/Blaster worm[EB/OL].2003-08—11.http://www.cert.org/advisories/CA.2003—20.html.

同被引文献11

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部