期刊文献+

僵尸网络研究 被引量:4

Study on Botnet
原文传递
导出
摘要 僵尸网络是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击,僵尸网络对因特网安全已造成严重威胁。深入研究分析了僵尸网络的三种模型,并对僵尸网络的发现、追踪进行了探讨。 Botnet is a novel attack strategy evolved from traditional malware forms, which provides attackers with stealthy, flexible and efficient one-to-many commands and control mechanisms, and could control a number of zombies achieve information theft, distributed denial-of-service, and spam sending. Botnet is a serious threat to the Internet security. In this paper, three models of botnet are analyzed in depth, and the latest techniques in finding and tracking the botnet are also discussed.
出处 《通信技术》 2010年第2期10-12,16,共4页 Communications Technology
基金 国家高技术研究发展计划(863) 信息产业部电子发展基金[2006]634
关键词 僵尸程序 僵尸网络 拒绝服务攻击 蜜网技术 bot botnet DDoS honeynet
  • 相关文献

参考文献5

二级参考文献15

共引文献167

同被引文献36

  • 1梁玉锋,梁漫春.提高八端口网络确定微波相位差精度的新算法[J].微波学报,2005,21(B04):28-30. 被引量:2
  • 2CNCERT/CC.CNCERT互联网安全威胁报告[EB/OL].2011/6.
  • 3中国互联网协会.2011年第二季度中国反垃圾邮件状况调查报告[EB/OL].http://www.anti-spam.cn/pdf/2011_02.pdf.
  • 4Shevterkar A,Ansari N.Is it congestion or a DDOS attack[J].IEEE Com-munications Letters,2009,13(7):546-548.
  • 5Oikonomou G,Mirkovic J.Modeling human behavior for defense against flash-crowd attacks,2009[C]//Communications,2009.ICC'09.IEEE Intern-ational Conference on,2009:1-6.
  • 6Yu Shui,Zhou Wanlei,Jia Weijia,et al.Discriminating DDOS attacks from flash crowds using flow correlation coefficient[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(6):1073-1080.
  • 7Zhu Guangxi,Zhu Yaoting.On the testing for alpha-stable distributions of network traffic[J].Computer Communications,2004,27(5):447-457.
  • 8Fabian M A R J Z,Terzis M A.My botnet is bigger than yours(maybe,better than yours):why size estimates remain challenging[C]//Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets,Cambridge,USA,2007:1-8.
  • 9The Honeynet Project&Research Alliance.Know your enemy:tracking Botnets[K]..2005
  • 10WANG PING,WU LEI,CUMMINGHAM Ret al.Honeypot de-tection in advanced Botnet attacks[].International Journal of Infor-mation and Computer Security.2010

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部