期刊文献+

僵尸网络的危害及其应对策略 被引量:1

Harm and the Botnet Coping Strategies
下载PDF
导出
摘要 僵尸网络(Botnet)是一种从传统的恶意代码进化而来的新型的攻击方式。为攻击者提供了隐匿、灵活、且高效的一对多的命令与控制机制。可控制僵尸主机实施DDoS攻击、垃圾邮件发送,窃取敏感信息等攻击。Botnet正处于快速发展时期,对网络安全构成了越来越大的威胁,对中国造成的危害尤为严重,由Botnet发起攻击的破坏性非常惊人。介绍了Botnet的危害及应对Botnet的措施。 Bomet is a novel attack strategy evolved from traditional malware forms;it provides the attackers stealthy, flexible and efficient one-to-many Command and Control mechanisms,that can be used to order an army of zombies to achieve the goals including information theft,launching distributed denial of service,and sending spam.Botnet has stepped into the expanding phase and has been a serious threat to Intemet security,especially in China mainland.In this paper,Botnet to network security poses a growing threat from the devastating attack, the damage of Botnet is very alarming.Introduced the harm and the measures to copy with it were given.
作者 贾花萍 JIA Hua-ping(Department of Computer Science, Weinan Teachers College, Weinan 714000, China)
出处 《电脑知识与技术》 2008年第2期618-620,共3页 Computer Knowledge and Technology
关键词 僵尸网络 IRC 分布式拒绝服务 BOT Bomet IRC Dstribute Denial of service(DDoS) bot
  • 相关文献

参考文献3

二级参考文献15

  • 1MIRKOVIC J, REIHER P. A taxonomy of DDoS attack and DDoS denfence machanisims[ J]. ACM SIGCOMM Computer Communications Review, 2004, 34(2) : 2 -3.
  • 2周勇林.僵尸网络的威胁和应对措施[R].国家计算机网络应急技术处理协调中心,2005.
  • 3OIKARINEN J. IRC history by Jarkko Oikarinen[ EB/OL]. http://www. irc. org/history_docs/jarkko.html, 1998.
  • 4The honeynet project & research alliance. Know your enemy: tracking botnets[EB/OL].http://project.hoceynet.org/papers/bots/, 2005 -03.
  • 5PURI R. Bots & Botnet: an overview[ A]. GSEC practical Assignment Version 1.4b[ C].2003.6 -7.
  • 6MCCARTY B. Botnets: big and bigger[J]. IEEE Security & Privacy, 2003, 1(4).
  • 7DAGON D , ZOU C, LEE W. Modeling botnet propagation using time zones[ A]. 13th Annual Network and Distributed System Security Symposium (NDSS) [C].2006.
  • 8HARDIN JD. The scanner tarpit howto [EB/OL]. http://www. inpsec.org/linax/security/scanner-tarp it.html, 2002.
  • 9LISTON T. Welcome to my tarpit - the tactical and strategic use of labrea [ EB/OL]. http://www.hackbus ters.net/LaBres/LaBrea.txt, 2001.
  • 10PROVOS N. A virtual honeypot framework [ R / OL ] . http : / /www. citi. umich.edu/techreprts/reports/reports/citi-tr-03-1.pdf, 2003.

共引文献32

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部