期刊文献+

一种基于特征提取的高效蠕虫自动防御系统

Effective Worm Automatic Defense System Based Signature Generation
下载PDF
导出
摘要 蠕虫的快速传播给因特网安全带来极大的挑战,设计和实现了一种有效的蠕虫检测和防御系统,提出二分聚类等方法改进了前期过滤和检测技术,有效降低后期处理数据量的同时提高了数据纯度,并提出一种基于Bloom Filter的位置相关的特征提取方法,降低资源消耗并产生更准确的特征.实验结果表明该系统能够有效地发现蠕虫活动并提取出准确的特征,实现基于内容特征的自动防御. The fast spread of worm is a great challenge to Internet security. An effective worm detection and defense system is designed and implemented. A binary cluster algorithm is proposed to improve the front traffic filter, which reduce the traffic and enhance its purity. A method of position-aware signature generation based Bloom Filter is proposed to bring better performance and more accurate signature. Experiments show the system can effective detect worm traffic and generate accurate signature for content-based automatic defense.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第6期1113-1118,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60573120)资助 国家高技术研究发展计划"八六三"项目(2007AA01Z420)资助
关键词 蠕虫 特征提取 聚类 BLOOM FILTER worm signature generation cluster Bloom Filter
  • 相关文献

参考文献4

二级参考文献38

  • 1卿斯汉,文伟平,蒋建春,马恒太,刘雪飞.一种基于网状关联分析的网络蠕虫预警新方法[J].通信学报,2004,25(7):62-70. 被引量:39
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3WEAVER N,PAXSON V,STANIFORD S,et al.Large scale malicious code:a research agenda[EB/OL].http://www.cs.berkeley.edu/~nweaver/large_scale_malicious_code.pdf,2003.
  • 4MOORE D,PAXSON V,SAVAGE S,et al.Inside the slammer worm[J].IEEE Magazine of Security and Privacy,2003,1(4):33-39.
  • 5DENNING D E.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,SE-13:222-232.
  • 6SCHONLAU M,THEUS M.Detecting masquerades in intrusion detection based on unpopular commands[J].Information Processing Letters,2000,76(1,2):33-38.
  • 7STEVENS W.TCP/IP Illustrated,Volume 1:the Protocols[M].USA:Addison Wesley,1994.
  • 8WANG P,YUN X C,FANG B X.A large network malicious code detection system:VDS[J].WSEAS Transactions on Information sciEnce and Applications,2004,1(4):994-1003.
  • 9反病毒软件评测[EB/OL].http://download.5iyt.com/infoview/Articie_127.htm.Evaluating of anti-virus software[EB/OL].http://download.5iyt.com/infoview/Article_ 127.htm.
  • 10Lippmann R. P. , Fried D. J. , Graf I. et al. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, Hilton Head, SC, 2000, 2: 1012-1035

共引文献213

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部