期刊文献+

僵尸网络传播模式分析和防治对策 被引量:3

The Analysis of Botnet Transmission Model and the Prevention & Cure Methods
下载PDF
导出
摘要 僵尸网络在最近几年对网络安全产生了巨大的影响,严重威胁到用户的信息安全。僵尸网络由控制者利用控制协议对成千上万的僵尸主机进行控制,实施各种网络安全攻击。文章对僵尸网络的基本工作原理进行说明,对僵尸网络的传播模式进行了分析,并在此基础上提出了相应的防治对策。 Botnets have created a huge influence on network security in the past few years. Users' information security, e - business and e - bank information security have been threatened seriously. Botnets, which are controlled by the masters using control protocols control the thousands of bot - hosts, and implement many kinds of network security attacks. This paper describes the basic principles about botnets, analyses the transmission model of bomets, and proposes the prevention & cure methods on the basis of the analysis.
作者 沈利香
出处 《常州工学院学报》 2008年第6期38-42,共5页 Journal of Changzhou Institute of Technology
关键词 僵尸网络 IRC 网络安全 botnet IRC network security
  • 相关文献

参考文献11

  • 1诸葛建伟,韩心慧,叶志远,等.僵尸网络的发现与跟踪[C].全国网络与信息安全技术研讨会,2005.
  • 2诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 3国务院信息化工作办公室.中国信息化发展报告2006[R/OL].[2008-08-06].http://www.acsi.gov.cn/WebSite/ACSI/UpFile/File149.pal.
  • 4Barford P,Yegneswaran V.An inside look at bothers[J].Advances in Information Security,Malware Detection Springer-Verlag,2007(27):171-191.
  • 5Rajah MA,Zarfoss J,Monrose F,et al.Security and privacy:A multifaeeted approach to understanding the botnet phenomeno[C]//Alraeia,a JM,Almeida VAF,Barford P,eds.Proc.of the 6th ACM Internet Measurement Conf.(IMC 2006).Rio de Janeriro:ACM Press,2006(b):41-52.
  • 6蔡慧梅.僵尸网络的研究与发现[J].计算机安全,2008(4):28-31. 被引量:6
  • 7陆伟宙,余顺争.僵尸网络检测方法研究[J].电信科学,2007,23(12):71-77. 被引量:7
  • 8John Canavan.The evolution of malicious IRC bots,symantec security response(from the proceedings of the VB2005 conference)[C/OL].[2008-08-06].http://www.symantec.com/aveenter/reference/the.evolution.of.malicious.irc.bots.pdf.
  • 9Bachcr P,Holz T,Kotter M,et al.Know your enemy:Tracking botnets[R/OL].[2008-08-06].http://www.honeynet.org/papers/bots.
  • 10Daswani N,Stoppelman M.The anatomy of cliekbot.A[(C/OL].In:Proe.of the 1st workshop on hot topics in understanding bothers(HotBots 2007).[2008-08-06].http://portal.acm.org/citation.cfm?id=1323128.1323139 & coll=GUIDE & dl=GUIDE & CFID=16751383 & CFrOKEN=82837820.

二级参考文献26

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 32006 Annual Report by CNCERT/CC,www.cert.org.cn/english_Web/ document/2006AnnualReportByC NCERT.pdf.
  • 4Barford P, Yegneswaran V. An inside look at botnets, in series: advances in information security, Springer, 2006.
  • 5LURHQ Threat Intelligence Group. Bobax trojan analysis, http:// www.lurhq.com/bobax.html.
  • 6Julian B.Peer-to-peer botnets: overview and case study. In: HotBots '07, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 2007.
  • 7Wang P, et al. An advanced hybrid peer to peer botnet. In: HotBots'07, First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 2007.
  • 8Ianelli N ,Hackworth A. Botnets as a vehicle for online crime. CERT Coordination Center,2005.
  • 9Honeynet Project. Know your enemy:tracking botnets, http://www. honeynet.org/papers/bots/.
  • 10Malan D. Rapid detection of botnets through collaborative networks of peers, http'.// www. eecs.harvard, edu/ -malan/ publications/ thesis, pdf.

共引文献167

同被引文献14

  • 1孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 2刘冬梅.跟踪僵尸网络[J].信息技术与信息化,2006(6):47-49. 被引量:5
  • 3安德智.僵尸网络的攻击原理及其对策[J].计算机安全,2007(5):73-76. 被引量:3
  • 4李金良僵尸网络及其防御研究[D].中国优秀硕士学位论文全文数据库,2007.
  • 5苏云琳.僵尸网络检测系统的分析与设计[D].中国优秀硕士学位论文全文数据库,2010.
  • 6Kang Jian,Zhang Junyao.Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM[C]//Proeeed- ings of the 2nd International Symposium on Electronic Com- merce and Security, 2009.
  • 7Zhu Zhaosheng, Fu Zhi Judy, Lu Guohan, et al. Botnet re- search survey [C]//Proe of the 32nd Int Computer Software and Applications Conference. 2008.
  • 8OWASP. The Ten Most Critical Web Application Security Risks[EB/OL].http://www.owasp.org/index.php/Top_10_2010,2010.
  • 9Dean T,Marc F,Eric J. Symantec global Internet security threat report:Trends for July-December 07(VolumeⅩⅢ)[R].Cupertino,CA,USA:Symantec Inc,2008.
  • 10陆伟宙,余顺争.僵尸网络检测方法研究[J].电信科学,2007,23(12):71-77. 被引量:7

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部