期刊文献+

“震荡波”蠕虫分析与防范 被引量:8

Analysis and Prevention of “Sasser” Worm
下载PDF
导出
摘要 分析了“震荡波”蠕虫的行为,包括它的传播方式、传播特征和被感染主机的特征。剖析了“震荡波”蠕虫网络攻击的两个主要步骤:寻找漏洞和感染系统,并指出了它的危害性,同时给出了清除“震荡波”蠕虫的方法和步骤;最后对该蠕虫的防范给出了一些建设性的建议。 The behaviors of “sasser” worm is analyzed, including its propagation way, its characteristics and the characteristics of infected hosts. The two steps of “sasser” worm for attacking network are analyzed, those are seeking the vulncrabilities and infecting system, furthermore, its compromises are pointed out. Simultaneously, the paper brings forward some methods and steps to remove “sasser” worm. Finally, some constructive suggestions are provided to prevent the worm.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第18期65-67,共3页 Computer Engineering
基金 国家自然科学基金资助项目(90204012) 河北省教育厅科技基金资助项目(2004445)
关键词 “震荡波” 蠕虫传播 防范 网络安全 Sasser Worm propagation Prevention Network security
  • 相关文献

参考文献6

  • 1AFP.Millions Infected by Internet Worm: Experts. http://www.abc.net. au/news/newsitems/s1099735.htm,2004-05-03
  • 2趋势科技.杀手肆虐, 全球损失逾30亿美元[EB/OL].http://focus.news. yam.com/ .type/life/auto/5042/,2004-05.
  • 3Roculan J.SQLExp SQL Server Worm Analysis.http://securityresponse. symantec.com/avcenter/Analysis-SQLExp.pdf,2003-01
  • 4Moor D.Analysis of the Sapphire Worm-A Joint Effort of CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE. http://www.caida.org/analysis/security/sapphire/,2003-02
  • 5Moor D.CAIDA Analysis of Code-Red.http://www.caida.org/analysis/ security/ code-red/
  • 6Song D. A Snapshot of Global Internet Worm Activity.http://www.first. org/events/progconf/2002/d5-02-song-slides.pdf,2002-02

同被引文献73

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部