期刊文献+

Internet蠕虫防范技术研究与进展 被引量:5

Research and Development on Internet Worm Containment Technology
下载PDF
导出
摘要 当前蠕虫的频频爆发使得蠕虫问题已成为网络安全领域的焦点问题。分析了蠕虫的特征行为,研究了国内外几种最新的Internet蠕虫防范系统,并在此基础上展望了蠕虫攻防的发展趋势。 Owing to the frequent explosions of Internet worms, Internet worm has been the focus of attention in cyberspace security field recently. This paper first analyzes lnternet worm' s characteristics, then describes some Internet worm containment systems which are proposed at home and abroad, and prospects the trend of worm and anti-worm technology in the end.
出处 《计算机应用研究》 CSCD 北大核心 2006年第6期13-15,30,共4页 Application Research of Computers
基金 国家教育部博士点基金资助项目(20020699026)
关键词 蠕虫 网络安全 传播模型 过滤 Internet Worm Cyberspace Security Propagation Model Filter
  • 相关文献

参考文献25

  • 1Nicholas Weaver.Potential Strategies for High Speed Active Worms:A Worst Case Analysis[EB/OL].http://www.cs.berkeley.edu/~nweaver/worms.pdf,2002.
  • 2David Moore,Colleen Shannon,Jeffery Brown.Code-Red:A Case Study on the Spread and Victims of an Internet Worm[EB/OL].http://www.caida.org/outreach/papers/2002/codered.pdf,2002.
  • 3S Singh,C Estan,G Varghese,et al.The Earlybird System for Real-time Detection of Unknown Worms[R].Technical Report CS2003-0761,University of California,San Diego,2003.
  • 4Chen Xuan,Heidemann John.Detecting Early Worm Propagation through Packet Matching[R].Technical Report ISI-TR-2004-585,USC/Information Sciences Institute,2004.
  • 5Zou Cliff C,Gong Weibo,Don Towsley,et al.Monitoring and Early Detection for Internet Worms[EB/OL].http://tennis.ecs.umass.edu/~czou/research/earlyDetectionJournal.pdf,2003.
  • 6Chen Shigang,Tang Yong.Slowing Down Internet Worms[EB/OL].http://www.cise.ufl.edu/~sgchen/papers/icdcs 2004.pdf,2004.
  • 7云晓春.Internet蠕虫主动遏制[C].北京:全国网络与信息安全技术研讨会专题报告,2004.
  • 8Qin Xinzhou,David Dagon,Gu Guofei,et al.Worm Detection Using Local Networks[EB/OL].http://www.cc.gatech.edu/people/home/xinzhou/TR_CoC_04.pdf,2003.
  • 9Brent N Chun,Jeason Lee,Hakim Weatherspoon.Netbait:A Distri-buted Worm Detection Service[R].Intel Technical Report IRB-TR-03-033,2003.
  • 10Spafford Eugene H.The Internet Worm Program:An Analysis[J].ACM Computer Communication Review,1989,19(1):17-57.

二级参考文献12

  • 1LINGER R C, MEAD N R, LIPSON H F. Requirements definition for survivable network systems[A]. Requrements Engineering'98[C]. Colorado, 1998.14-23.
  • 2Understanding symantec's anti-virus strategy for internet gateways[EB/OL]. http://www. symantec.com/avcenter/reference/ wpnavieg.pdf. 1999.
  • 3CHEUNG S, HOAGLAND J, LEVITT K, et al. The Design of GrIDS: A Graph-Based Intrusion Detection System[R]. Technical Report CSE-99-2, U.C. Davis Computer Science Department, 1999.
  • 4Computer emergency response team(CERT)[EB/OL]. http://www.cert.org/advisories/.
  • 5STEVENS W R. TCP/IP Illustrated, Volume 1:The Protocols[M].USA: Addison Wesley, 1994.
  • 6CARLA T L, BRODLEY C E. Temporal sequence learning and data reduction for anomaly detection[A]. Proc of the 5th Conference on Computer and Communications Security[C]. New York,1999.
  • 7ROESCH M. Writing snort rules: how to write snort rules and keep your sanity[EB/OL]. http://www.snort.org.
  • 8http://www.sans.org/y2k/lion.htm
  • 9CERT Advisory CA-2001-02 Multiple Vulnerabilities in BIND. http://www.cert.org/adviso ties/CA-2001-02.html,
  • 10Danahy J.Worms in the Workplace. Sc Magazine,2001-03

共引文献55

同被引文献28

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部