期刊文献+

中心式结构僵尸网络的检测方法研究 被引量:5

Novel Method for Detecting Centralized Botnets
下载PDF
导出
摘要 从近年发展趋势看,僵尸网络的结构正呈现多样化发展的趋势,中心式结构僵尸网络因控制高效、规模较大成为网络安全最大的威胁之一.中心式结构僵尸网络采用一对多的命令与控制信道,而且僵尸主机按照预定的程序对接收到的命令做出响应,因此,属于同一僵尸网络的受控主机的行为往往具有很大的相似性与同步性.针对中心式结构僵尸网络命令控制流量的特点,本文提出一种基于网络群体行为特点分析的检测方法并用于僵尸网络的早期检测与预警.实际网络流的实验表明,本方法能够有效检测当前流行的中心式结构僵尸网络. Botnet is a novel attack strategy evolved from traditional malware forms and imposes a serious threat on the network security.Especially,most of the existing botnets employ the centralized architecture which provides a simple,low-latency,anonymous and efficient real-time communication platform.The bots connect to a remote central server and wait for the commands from the botnet controller.The flows caused by the commands and the responses from the bots are generally very similar with each other and synchronous in time,because of the limited set of the commands and the programmed responses of the bots.The main contribution of this study is the development of a common detection mechanism aiming at the centralized botnets by monitoring the global correlated behaviors embedded in the command and control(CC) traffic.By conducting an experiment with real traffic data,it shows that this method is efficient in detecting the prevalent centralized botnets.
作者 王涛 余顺争
出处 《小型微型计算机系统》 CSCD 北大核心 2010年第3期510-514,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划项目专题课题(2007AA01Z449)资助 国家自然科学基金-广东联合基金重点项目(U0735002)资助
关键词 僵尸网络 僵尸主机 命令与控制信道 群体行为 botnet bot control and command channel global correlated behaviors
  • 相关文献

参考文献10

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2Moheeb Abu Rajab, Jay Zarfoss, Andreas Terzis. A multifaceted approach to understanding the botnet phenomenon[ A]. In: Almeida JM, Almeida VAF, Barford P, eds. Proc. ofthe 6th ACM Internet Measurement Conf. ( IMC 2006) [ C ]. Rio de Janeiro: ACM Press, 2006, 41-52.
  • 3Ncil Daswani, Michael Stoppclman. Google click quality and security teams[ C]. The Anatomy of Clickbot. A. In: Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007). Boston, 2007.
  • 4Timothy Strayer W, Robert Walsh, Carl Livadas, et al. Detecting bomets with tight command and control[ C ]. The 31 st IEEE Conference on Local Computer Networks, Nov. 2006, 195- 202.
  • 5Anestis Karasafidis, Brian Rexroad, David Hoeflin. Wide-scale botnet detection and characterization [ C ]. In USENIX Workshop on Hot Topics in Understanding Bomets (Hot-Bots07), 2007.
  • 6Anagnostakis K G, Sidiroglou S, Akritidis P,et al. Detecting targeted attacks using shadow honeypots[ C]. In Proceedings of 14th USENIX Security Symposium, August 2005,129-144.
  • 7Jan Goebel, Thorsten Holz. Rishi: Identify bot contaminated hosts by IRC nickname evaluation [ C ]. In : Proc. of the I st Workshop on Hot Topics in Understanding Botnets ( HotBots 2007 ). Boston, 2007.
  • 8Gu Guo-fei, Zhang Jun-jie,Wenke Lee. BotSniffer: detecting botnet command and control channels in network traffic[ C]. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS08), 2008.
  • 9Rudi Cilibrasi, Paul M. B. Vit'anyi. Clustering by compression [J]. IEEE Transactions on Information Theory, APRIL 2005,51 (4) : 1523-1545.
  • 10L da F Costa, Rodrigues F A, Travieso G, et al. Characterization of complex networks: a survey of measurements[ J]. Adv. Phys. 2007,56( 1 ) :167-242.

二级参考文献4

共引文献156

同被引文献33

  • 1李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3Wang P, Sparks S, Zou C C. An Advanced HybridPeer to-Peer Botnet[C].//Proc. of the 1st Workshop on HotTopics in Understanding Botnets (HotBots 2007), Boston, 2007.
  • 4STRAYER W T, WALSH R. Detecting botnets with tight com- mand and control [ C ]//Proceedings of the 31 st IEEE Conference on Local Computer Networks, Tampa, FL, 2006 : 200 - 202.
  • 5GU G, PERDISCT R, ZHANG J, et al. BotMiner: Clusteringa- nalysis of network traffic for protocol - and structure - independent botnet detection[ C ]//Proceedings of the 17th USE - NIX Securi- ty Symposium ( Security' 08) , San Jose, CA,2008 : 139 - 154.
  • 6Peter wurzinger, Leyla Bilge, Horsten Holz. Automatically generating models for hotnet detection [G]. Lecture Notes in Computer Science 5789: Computer Science, 2009: 232-249.
  • 7WANG W, Fang B X. A novel approach to detect IRC based botnets [C]. Proceedings of the International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009: 408-411.
  • 8GU G, ZHANG J, Lee W. BotSniffer: detecting botnet command and control channels in network traffic [C]. Proc NDSS' 08, 2008.
  • 9CNCERT/CC.CNCERT互联网安全威胁报告[EB/OL].2011/6.
  • 10中国互联网协会.2011年第二季度中国反垃圾邮件状况调查报告[EB/OL].http://www.anti-spam.cn/pdf/2011_02.pdf.

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部