期刊文献+

一种新型P2P Botnet的分析与检测 被引量:1

Analysis and Detection of a new P2P Botnet
下载PDF
导出
摘要 Botnet是一种新型网络攻击方式,它为攻击者提供了灵活高效的命令与控制机制,对Internet安全造成了巨大的威胁。该文概要介绍了Botnet技术,分析了基于P2P技术的Botnet的特点,并对一种新型P2P Botnet进行了深入的分析和研究,提出了对新型P2P Botnet的检测方法。 Botnet is a novel network attack strategy, it provides the attackers efficient and flexible Command and Control mechanisms, and has been one of the most serious threat to Internet security. In this paper, an overview of the techniques of Botnent is firstly presented. Then the analysis of P2P-based BOther is given. A new P2P-based BOther is also analysed and researched in depth, furthermore, methods of detecting the new P2P-based Bother are discussed.
出处 《计算机安全》 2008年第7期16-19,共4页 Network & Computer Security
关键词 BOTNET BOT P2P 命令与控制 检测 Bother hot Peer-to-Peer Command and Contro detection
  • 相关文献

参考文献6

  • 1.Taxonomy of Botnet Threats[].A Trend Micro White Paper.2006
  • 2Evan Cooke,Farnam Jahanian,Danny McPherson.The Zombie Roundup:Understanding Detecting,and Disrupting Botnets[].SRUTI Workshop July.72005
  • 3Reinier Schoof,Ralph Koning.Detecting peer-to-peer Botnets[].February.42007
  • 4Ping Wang,Sherri Sparks,Cliff C.Zou.An Advanced Hybrid Peer-to-Peer Botnet[]..2006
  • 5Julian B.Grizzard,,Vikram Scharma,Chris Nunnery,Brent Byung,Hoon Kang.Peer-to-Peer Botnet:Overview and Case Study[]..2007
  • 6Arce I,Levy E.An analysis of the slapper worm[].IEEE Security&Privacy.2003

同被引文献16

  • 1FREILING F, HOLZ T, WICHERSKI G. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks,AIB-2005-07 [ R]. [ S. l. ] : CS Dept of RWTH, Aachen University, 2005 : 319 - 335.
  • 2RAMACHANDRAN A, FEAMSTER N, DAGON D. Revealing Bot- net membership using DNSBL counter-intelligence [ C ]// Proc of the 2nd USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet. Berkeley, CA : USENIX Association,2006:8.
  • 3COOKE E, JAHANIAN F, MCPHERSON D. The zombie roundup: understanding, detecting, and disrupting Botnets [ C ]//Proc of SRUTI: Steps to Reducing Unwanted Traffic on the Internet. Berkeley, CA : USENIX Association ,2005:6.
  • 4WANG Ping, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer botnet[ C]// Proc of the 1st Workshop on Hot Topics in Understanding Bothers (HotBots). [ S. l.] : IEEE Computer Society,2007:2.
  • 5GRIZZARD J B, SHARMA V, NUNNERY C, et al. Peer-to-peer Botnets[ C]//Proc of HotBots '07 Conference. 2007.
  • 6NUMMIPURO A. Detecting P2P-controlled bots on the host [ EB/ OL]. (2007). http://www.tml. tkk. ft./Publieaions/C/25/papers/ Nummipuro-final. pdf.
  • 7LV Q, CAO P, COHEN E, et al. Search and replication in unstructured peer-to-peer networks[ C ]//Proc of the 16th International Conference on Supercomputing. New York: ACM Press,2002:84-95.
  • 8TANG Y, CHEN S. Defending against internet worms: a signature- based approach[ C]//Proc of IEEE INFOCOM. Miami, FL: [ s. n], 2005 : 1384-1393.
  • 9DOUCEUR J R. The Sybil attack[C]//Proc of the 1st International Workshop on Peer-to-Peer Systems. London, UK: Springer-Verlag, 2002:251-260.
  • 10STINSON E, MITCHELL J C. Characterizing bots' remote control behavior[ C ]//Lecture Notes in Computer Science. Berlin:Springer, 2007:89-108.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部