期刊文献+

基于终端行为特征的IRC僵尸网络检测 被引量:16

IRC Botnet Detection Based on Host Behavior
下载PDF
导出
摘要 目前已有的IRC僵尸网络检测算法存在两个问题:需要先验知识以获取匹配模式,无法满足实时处理需求.为解决这两个问题,文中提出了基于昵称和命令序列这两个终端行为特征的IRC僵尸网络检测算法.文中提出三种属性分别从内容、组成和结构三方面互补的刻画两个昵称的相似性,给出两个昵称相似性的量化因子,根据这量化因子生成弹性TRW算法以进行IRC僵尸网络实时检测.文中还在分析僵尸终端登录服务器的行为的基础上,提出了基于命令序列相似性的检测算法.算法评估实验证明两个算法行之有效.最后将这两个算法用于大规模网络环境中实时检测IRC僵尸网络,在两周内检测到162个僵尸频道. There are two problems in current algorithms for IRC botnets detection. One is that detection algorithms require some prior knowledge of botnets to generate matching patterns. The other is that algorithms can not perform detection online. To solve these problems, this paper proposes two IRC botnet detection algorithms based on host behavior. Three attributes, LCS rate, compositive distance and RN_dice coefficient, are discussed to quantify the similarity of nicknames from three aspects: content, composition and structure. To detect IRC hornets on- line, extended TRW algorithm based on the similarity of nicknames is proposed. This paper also proposes a detection algorithm based on the command sequence of IRC clients. Evaluations of these algorithms indicate that the two algorithms are correct and valid. At last, detection algo- rithms are used in large-scale network to detect IRC botnets and detect 162 bot channels within two weeks.
出处 《计算机学报》 EI CSCD 北大核心 2009年第10期1980-1988,共9页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2007CB311100) 国家"八六三"高技术研究发展计划项目基金(2009AA01Z437 2007AA010501 2007AA01Z474)资助
关键词 僵尸网络 IRC昵称 命令序列 相似性度量 botnet IRC nickname command sequence similarity measurement
  • 相关文献

参考文献20

  • 1杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 2Oikarinen J, Reed D. Internet relay chat protocol. Request for Comments (RFC) 1459, IETF, May, 1993.
  • 3诸葛建伟,韩心慧,周勇林,宋程昱,郭晋鹏,邹维.HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J].通信学报,2007,28(12):8-13. 被引量:44
  • 4Malan D J. Rapid detection of botnets through collaborative networks of peers [Ph. D. dissertation]. Harvard University, Cambridge, Massachusetts, 2007.
  • 5Al-Hammadi Y, Aickelin U. Detecting bomets through log correlation//Proceedings of the IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation. Tuebingen, Germany, 2006: 97-100.
  • 6Binkley J R, Singh S. An algorithm for anomaly-based botnet detection//Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet. San Jose, CA, 2006:43-48.
  • 7Strayer W T, Walsh R et al. Detecting botnets with tight command and control//Proceedings of the 31st IEEE Conference on Local Computer Networks. Tampa, FL, 2006:195-202.
  • 8Goebel J et al. Rishi: Identify bot contaminated hosts by IRC nickname evaluation//Proceedings of the HotBots' 07, First Workshop on Hot Topics in Understanding Botnets. Cambridge, MA, 2007.
  • 9Karasaridis A, Rexroad B et al. Wide-scale hotnet detection and characterization//Proceedings of the HotBots' 07, First Workshop Cambridge, in Understanding Botnets.
  • 10Gu G, Porras P, Yegneswaran V et al. BotHunter: Detecting malware infection through ids driven dialog correlation// Proceedings of the 16th USENIX Security Symposium(Security'07). Boston, Massachusetts, 2007:167-182.

二级参考文献35

  • 1杨武,方滨兴,云晓春,张宏莉,胡铭曾.一种高性能分布式入侵检测系统的研究与实现[J].北京邮电大学学报,2004,27(4):83-86. 被引量:14
  • 2胡希明 毛德操.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 3[1]Libnids. An implementation of an E-component of network intrusion detection system. http: //www. packetfactory.net/Proj ects/Libnids/
  • 4[2]Chesson G. UNIX Review,1987,5(9):70
  • 5[3]Goldberg M, Neufeld G. The raven protocol framework.Univ Tech Rep TR-92-15, British Columbia, Vancouver,BC, Canada: 1992
  • 6[4]Goldberg M, Neufeld G, Ito M. A parallel approach to OSI connection-oriented protocols. In: Proc 3rd IFIP Workshop Protocols for High-Speed Networks, Stockholm,Sweden: 1992. 225
  • 7[5]Jain N, Schwartz M, Bashkow T. Transport protocols processing at GBPS rates. In: Proc ACM SIGCOMM'90,Philadelphia, PA: 1990. 188
  • 8[6]Yates D, Nahum E, Kurose J, et al. Networking support for large scale multiprocessor servers. In: Proc SIGMETRICS'96, Philadelphia, PA: 1996. 116
  • 9[7]Bjorkman M,Gunningberg P. IEEE/ACM Transctions on Networking, 1998,6(3): 262
  • 10[8]tcpdump. Dump traffic on a network. http://www. tcpdump. org

共引文献60

同被引文献158

引证文献16

二级引证文献87

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部