期刊文献+

一种新的蠕虫防范方法

New Method to Prevent Worms
下载PDF
导出
摘要 提前对特定漏洞可能出现的攻击数据包进行特征提取,并以此特征为基础描述了一种可以阻断未来针对特定漏洞恶意攻击的蠕虫防范方法,最后提出一种新的蠕虫防范模式和存在的一些问题。 Basing on creating the signature of the possible attacking packets on specifically vulnerability in advance, this paper describes a new method to prevent the worms, which can be used to hold back the fast propagation of the new worms. At the end, a new model to keep away the worms is pointed out, and some problems about it are discussed.
出处 《计算机应用研究》 CSCD 北大核心 2006年第8期123-125,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(90104005 90204011 60473023)
关键词 攻击数据包 蠕虫防范 特征提取 异常检测 Attacking Packets Worm Defence Signature Generation Anomaly Detection
  • 相关文献

参考文献3

  • 1Stuart Staniford, David Moore, Vem Paxson, et al. The Top Speed of Flash Worms[ C]. Proceedings of the ACM Workshop on Rapid Malcode, 2004.
  • 2Carey Nachenberg. From Anti Virus to Anti Worm: A New Strategy for a New Threat Landscape[ C]. Proceedings of the ACM Workshop on Rapid Malcode, 2004.
  • 3杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27

二级参考文献15

  • 1[2]CERT Advisory CA-2001-23. Continued Threat of the "Code Red Ⅱ" Worm. http:∥www. cert. org/advisories/CA-2001-23 .html
  • 2[3]Moore D. The Spread of the Code-Red Worm (CRv2). http:∥www. caida.org/analysis/security/-code-red/coderedv2 analysis.xml, Nov 2001
  • 3[4]Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time. In: Proc of the USENIX Security Symposium, 2002
  • 4[5]Das Bistro Project's anti-code-red default.ida. http:∥www. dasbitro.com/default.ida
  • 5[6]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32/Nachi. A,http:∥www. f-prot.com/virusinfo/descriptions/nachi_A.html
  • 6[7]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32.Blaster. Worm,http:∥securityresponse.symantec.com/avcenter/venc/data/w32.blaster, worm.html
  • 7[8]Cliff Changchun Zou, Don Towsley, Email Virus Propagation Modeling and Analysis, Umass ECE Technical Report TR-03-CSE-04, May, 2003
  • 8[9]Michael Liljenstam, A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations, In: Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society Press, Fort Worth,TX, Oct 2002
  • 9[10]David Moore, Code-Red: A case study on the spread and victims of an Internet worm, In: Presented at the Internet Measurement Workshop (IMW) in 2002
  • 10[11]Cliff Changchun Zou, Weibo Gong, Don Towsley. Code Red Ⅱ Worm Propagation Modeling and Analysis.In: 9th ACM Conference on Computer and Communication Security, Nov. 18-22, Washington DC, USA,2002. http:∥tennis.ecs.umass.edu/~czou/research/codered.pdf

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部