期刊文献+

蠕虫检测技术研究进展 被引量:7

Research and development of worm detection technologies
下载PDF
导出
摘要 对蠕虫检测技术的进展进行了研究。由于能检测未知蠕虫,异常检测已成为蠕虫检测的重要发展方向。被动检测采用故意设计为有缺陷的系统HoneyPot,用来吸引攻击者、收集攻击信息并进行深度分析。主动检测对正常主机和蠕虫主机的混和流量进行处理,包括基于连接载荷和基于蠕虫行为的检测。分析并讨论了各类方法的特点和适用性,提出目前的检测技术需要更为有效的蠕虫检测指标,并基于正常主机和蠕虫主机在流量自相似性的差异,给出了相应的实时检测指标选择思路。 The worm detectiOn technologies are discussed. Anomaly detection will be a promising development because of the ability to detect unknown worms. For passive detection, the HoneyPot system designed deliberately with vuinerabilities is used to attract attackers, collect attack information and process analysis. Active detection methods can process the mixed traffics ofbenign hosts and worm hosts, including the payload-based and behavior-based worm detection methods. The characters and applicability of each method are discussed. The viewpoint that more effective worm detection indices are needed for detection methods is proposed. Based on the differences of traffic self-similarity between benign hosts and worm hosts, the idea on how to select real-time detection indices is interpreted.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第5期1060-1064,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(60503061) 湖北省自然科学基金项目(2006ABA039) 湖北省教育厅科学研究计划基金项目(D200623002)。
关键词 蠕虫检测 异常检测 被动检测 主动检测 蠕虫检测指标 worm detection anomaly detection passive detection active detection worm detection indices
  • 相关文献

参考文献35

  • 1John F Shoch, Jon A Hupp.The "worm" programs-early experience with a distributed computation[J]. Communications of the ACM,1982,25(3):172-180.
  • 2Eugene H Spafford.The Intemet worm program: an analysis[J]. ACM SIGCOMM Computer Communication Review, 1989,19 (1):17-57.
  • 3David Moore,Vern Paxson,Stefan Savage,et al.Inside the slammer worm[J].IEEE Security and Privacy, 2003,1(4):33-39.
  • 4Nicholas Weaver, Dan Ellis,Stuart Staniford,et al.Worms vs. perimeters: the case for HardLANs [C]. Proc of Hot Interconnects, 2004.http://www.icir.org/vern/papers/hardlans.hot-inter 04.pdf.
  • 5蒋建春,马恒太,任党恩,卿斯汉.网络安全入侵检测:研究综述[J].软件学报,2000,11(11):1460-1466. 被引量:370
  • 6David Dagon, Qin Xinzhou, Gu Guofei, et al. HoneyStat: local worm detection using honeypots[C]. Proc of 7th International Symposium on Recent Advances in Intrusion Detection,2004: 39-58.
  • 7John Levine, Richard LaBella, Henry Owen, et al. The use of honeynets to detect exploited systems across large enterprise networks [C]. Proc of IEEE Workshop on Information Assurance,2003:92-99.
  • 8Niels Provos.A virtual honeypot framework[R].Technical Report 03-1,2003. http://www.citi.umich.edu/techreports/reports/ citi-tr-03-1.pdf.
  • 9张新宇,卿斯汉,李琦,李大治,何朝辉.一种基于本地网络的蠕虫协同检测方法[J].软件学报,2007,18(2):412-421. 被引量:25
  • 10文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187

二级参考文献50

  • 1卿斯汉,文伟平,蒋建春,马恒太,刘雪飞.一种基于网状关联分析的网络蠕虫预警新方法[J].通信学报,2004,25(7):62-70. 被引量:40
  • 2Liu Meilan,Information and Communication Security CCICS’99.First Chinese Conference Inform,2000年,105页
  • 3刘美兰,信息和通信安全CCICS’99:第1届中国信息和通信安全学术会议论文集,2000年,105页
  • 4Chen S,Internet draftdraft- ietf- cidf- data- formats- 0 0 .txt,1998年
  • 5Bian Zhaoqi,Pattern Recognition,1988年
  • 6边肇祺,模式识别,1988年
  • 7何华灿,人工智能导论,1988年
  • 8Denning D E,IEEE Trans Software Eng,1987年,13卷,2期,222页
  • 9LINGER R C, MEAD N R, LIPSON H F. Requirements definition for survivable network systems[A]. Requrements Engineering'98[C]. Colorado, 1998.14-23.
  • 10Understanding symantec's anti-virus strategy for internet gateways[EB/OL]. http://www. symantec.com/avcenter/reference/ wpnavieg.pdf. 1999.

共引文献599

同被引文献35

引证文献7

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部