期刊文献+

基于计算机网络对抗的僵尸网络研究与进展 被引量:2

Research and development of Botnet based on computer network operations
下载PDF
导出
摘要 阐述僵尸网络的研究状况,给出其基本定义、结构和实现过程。通过Agobot实例分析,提出将僵尸网络纳入计算机网络对抗体系之中的观点。基于计算机网络对抗理论抽象出整个僵尸网络的概念模型,对模型中功能的实现进行探讨。指出僵尸网络研究中存在的问题与进一步研究的建议。 This paper expatiated the research status of Botnet, gave the basic definition, framework and realization process. Analyzed the instance of Botnet and brought forward the viewpoint that took Botnet into computer network operations. Abstracted the conception model of Botnet based on computer network operations theory, discussed the function of the model. At last, pointed out some questions and gave the more suggestion on the Botnet research.
出处 《计算机应用研究》 CSCD 北大核心 2009年第5期1621-1624,共4页 Application Research of Computers
基金 国家"973"重点资助项目(2002CB312105) 国家信息关防与网络安全保障可持续发展计划资助项目(2002-研2-A-007)
关键词 网络安全 僵尸网络 僵尸工具 计算机网络对抗 network security Botnet bot computer network operations (CNO)
  • 相关文献

参考文献14

  • 1McCARTY B. Botnets: big and bigger[ J]. IEEE Security & Privacy,2003,1 (4) :87-90.
  • 2GRIZZARD J B, SHARMA V, NUNNERY C. Peer-to-peer Botnets: overview and case study[ C ]//Proc of the 1 st Workshop on Hot Topics in Understanding Botnets. 2007.
  • 3LURHQ Threat Intelligence Group. Sinit P2P trojan analysis [ EB/ OL]. http ://www. lurhq, com/sinit, html.
  • 4LURHQ Threat Intelligence Group. Phabot trojan analysis[ EB/OL]. http ://www. lurhq, com/phatbot, html.
  • 5DoD Directive 0-8530.1, Computer network defense[ S]. 2001.
  • 6李肖坚.一种计算机网络自组织的协同对抗模型.计算机研究与发展,2005,42:256-260.
  • 7COOKE E, JAHANIAN F, McPHERSON D. The zombie roundup: understanding, detecting, and disrupting Botnets[ C]//Proc of USENIX Workshop on Steps to Reducinng Unwanted Traffic on the Internet. 2005:39-44.
  • 8McLAUGHLIN L. Bot software spreads, cause new worries [ J ]. IEEE Computer Society,2004,5(6) :1.
  • 9KRISTOFF J. Botnets[ C ]//Proc of the 32nd Meeting of the North American. [ S. l. ] : Network Operators Group, 2004.
  • 10PURl R. Bots & Botnet: an overview[ R]. [ S.l. ] : SANS Institute, 2003.

共引文献7

同被引文献21

  • 1孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 2Peter wurzinger, Leyla Bilge, Horsten Holz. Automatically generating models for hotnet detection [G]. Lecture Notes in Computer Science 5789: Computer Science, 2009: 232-249.
  • 3WANG W, Fang B X. A novel approach to detect IRC based botnets [C]. Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009: 408-411.
  • 4GU G, ZHANG J, Lee W. BotSniffer: detecting botnet command and control channels in network traffic [C]. Proc NDSS' 08, 2008.
  • 5P. Wolfowitz. DoD directive 3600.1: information operations Rev.1. Department of Defense, New York. [EB/OL].[2013-04-08]. http://www.iwar.org.uk/iwar/resources/doctrine/DOD36001.PD F.
  • 6Joint Chiefs of Staff. Joint publication 3-13: joint doctrine for information operations[M]. Washington DC:Joint Publication,1998.10.
  • 7Joint Chiefs of Staff. joint publication 1-02: department of defense dictionary of military and associated terms[M]. Washington DC: Joint Publication, 1998.10.
  • 8H. H. Shelton. Joint publication 2-0: doctrine for intelligence support to joint operations[M].Washington DC:Joint Publication,2000.5.
  • 9Joint Chiefs of Staff. Joint publication 2-01: joint and national intelligence support to military operations[M]. Washington DC:Joint Publication,2004.10.
  • 10Joint Chiefs of Staff. Joint publication 6-02: department of defense dictionary of military and associated terms[M]. Washin:on DC: Joint Publication, March 2006.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部