计算机病毒装备化关键技术研究
摘要
计算机病毒以其极强的破坏性和传染性,成了网络战研究的重点,并提出了病毒武器的概念。然而病毒的这些特征并不足以作为武器使用,本文提出对病毒进行改造,以适应装备化的需要。本文主要从计算机病毒的可控和跨平台两个方向进行了初步的探讨。
出处
《网络安全技术与应用》
2008年第3期66-68,共3页
Network Security Technology & Application
二级参考文献13
-
1Spafford E H. The Internet Worm:Crisis and Aftermath. Communications of the ACM, 1989,32(6):678-687
-
2Chen Xuan, Heidemann John. Detecting Early Worm Propagation through Packet Matching: [Technical Report ISI-TR-2004-585].USC/Information Sciences Institute,Feb. 2004
-
3Bakos G,Berk V. Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Messages. In: Proceedings of the SPIE Aerosense,2002
-
4Singh S, Estan C, Varghese G, Savage S. The EarlyBird System for Real-time Detection of Unknown Worms: [Technical Report CS2003-0761]. UCSD, 2003
-
5Gu RongJie, Xia DeLin, Yan PuLiu. An Adaptive Internet Backbone Malicious Activies Detection System Based on Frequent Pattern Mining. [J] GESTS International Transactions on Computer Science and Engineering., 2005,12: 41- 148
-
6Cai Y,Cercone N, Han J. Attribute-Oriented Induction in relational databases. In: G. Priatetsky-Shapiro and W.J. Frawley, eds.Knowledge Discovery in Databases, Cambrige, MA: AAAI/MIT,213-228
-
7Han J, Cai Y, Cercone N. Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowledge and Data Engineering, 1993 : 29-40 .
-
8Han J, Fu Y. Discovery of multiple-level association rules from large databases. In:Proc. 1995 Int. Conf. Very Large Data Bases(VLDB' 95), 1995
-
9Han Jiawei,Kamber Micheline. Data Mining Concepts and Techniques.[M] Canada: Morgan Kaufmann publishers
-
10Julish K, Dacier M. Mining Intrusion Detection Alarms for Actionable Knowledge. In: The 8th ACM Int Conf. on Knowledge Discovery and Data Mining, Edmonton, 2002
-
1思凌.网络战争和病毒武器[J].自动化博览,1996,13(5):6-10.
-
2陈正义,桂海祥,鄢明.浅析病毒武器及其防范方法[J].电子技术与软件工程,2013(24):221-221.
-
3雷玉堂.红外热成像技术及在智能视频监控中的应用[J].中国公共安全,2007,0(08B):114-120. 被引量:18
-
4黄山伐.冲破“三高一难”——台军模拟训练系统管窥[J].兵器,2013(12):26-34.
-
5DragonSlayer.《虚幻竞技场2003》武器使用指南[J].家庭电脑世界,2002(10):138-139.
-
6机器人 战争中的冷酷杀手[J].科学生活,2005,0(11):64-64.
-
7daut.Daut和他的FreeBSD世界“常规武器”使用[J].电脑高手,2003(7):102-104.
-
8孙茂盛.国外积极研制核化生机器人[J].国外防化科技动态,2005(12):3-5.
-
9朱中民.追根寻源电脑战[J].国防科技,2003,24(3):92-93.
-
10张翼.计算机病毒武器浅析[J].兵工自动化,2005,24(6):43-44. 被引量:3