期刊文献+

一种基于NetFlow的网络蠕虫检测算法 被引量:2

NetFlow based detecting worm algorithm
下载PDF
导出
摘要 为了论证网络传播蠕虫时将出现网络流量的异常特征的现象,分析了网络蠕虫的工作机制和扫描策略,提出了基于N etF low流信息检测网络蠕虫的检测方案,设计了一种检测网络蠕虫的逐步求精三级算法NDW(N etF low based detecting w orm)。算法通过依次检测主机总流量、特征端口和行为规律,快速有效地定位和判断异常主机。理论分析表明,该算法的时间复杂性不大于H(εM+O)(1))。实验结果表明,算法能够有效、准确地发现被网络蠕虫感染的主机。 The mechanism and strategy of network worm were analyzed and the phenomena that abnormal behaviors of network traffic occurred while spreading network worm was demonstrated. The solution to detecting network worm based on NetFlow flow information was put forward and an three-level-stepwise algorithm detecting network worm called NetFlow based Detecting Worm(NDW) algorithm was designed, in which by monitoring host traffic, well-known ports and behavior characteristics in turn, abnormal hosts could be determined and located fast and efficiently. The analysis results show that the time complexity of NDW is not more than H(εM+O)(1)). The experimental results show the NDW can locate infected hosts effectively and accurately.
作者 陈鸣 许博
出处 《解放军理工大学学报(自然科学版)》 EI 2006年第4期336-340,共5页 Journal of PLA University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(90304016)
关键词 网络蠕虫 检测算法 NETFLOW 流量 network worm detecting algorithm NetFlow traffic
  • 相关文献

参考文献8

  • 1NAZARIO J.The future of internet worms[EB/OL].http://www.crimelabs.net/docs/worm.html.2001-07-20.
  • 2MOORE D,SHANNON C,BROWN J.Code-red:a case study on the spread and victims of an Internet worm[C].New York:ACM Press,2002.
  • 3EUGENE H S.The internet worm program:an analysis[J].ACM SIGCOMM Special Interest Group on Data Communications,1989,19(1):1-29.
  • 4郑辉.Internet蠕虫研究[D].天津:南开大学,2003.http://user.nankai.edu.cn/cim/students/doctor/spark/Thesis/InternetWormResearch.pdf.
  • 5Nicholas Weaver.Potential strategies for high speed active worms:a worst case analysis[EB/OL].http://www.cs.berkeley.edu/~nweaver/worms.pdf.2002-03-24.
  • 6VOGT T.Simulating and optimizing worm propagation algorithms[EB/OL].http://web.lemuria.org/security/WormPropagation.pdf.2004-02-16.
  • 7PEUHKURI M.Internet traffic measurements-aims,methodology,and discoveries[EB/OL].http://www.netlab.tkk.fi/u/puhuri/publications/li.pdf.2002-05-28.
  • 8程光,龚俭,丁伟,徐加羚.面向IP流测量的哈希算法研究[J].软件学报,2005,16(5):652-658. 被引量:54

二级参考文献9

  • 1IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 2Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 3Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 4Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 5Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 6Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 7NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/
  • 8Niccolini S, Molina M, Duffield N. Hash functions description for packet selection. 2003. http://www.watersprings.org/pub/id/draft-niccolini-hash-descr-00.txt
  • 9程光,龚俭,丁伟.基于统计分析的高速网络分布式抽样测量模型[J].计算机学报,2003,26(10):1266-1273. 被引量:24

共引文献53

同被引文献14

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部