期刊文献+

An Overlay Network for Monitoring Activities of Computer Viruses

An Overlay Network for Monitoring Activities of Computer Viruses
下载PDF
导出
摘要 To accurately track computer viruses,an overlay network that monitors the activities of viruses is constructed.Identifying and locating nodes infected by virus on network is achieved by a naming system in which a node in the network is mapped to a unique serial number of the hard-drive.By carefully monitoring and recording sensitive communication between local system and remote nodes on the network,and suspicious operations on files that originate from remote nodes and entered via some form of file transfer,activities of viruses in both local and network level are recorded and ready for future analysis.These data can also be used in analysis of the mechanism of a computer virus as well as its spreading mode and pattern.
出处 《Engineering Sciences》 EI 2008年第1期52-58,共7页 中国工程科学(英文版)
基金 Project is supported by the National Nature Science Foundation of China(Grant No.60672142,60772053,90304005) New architecture and technology for the Internet information sharing,The relation and Countermeasure of Application Layer Behavior and Collective Performance of Internet,Forecast of Traffic Model on Internet Supported by National Basic Research Program of China,(Grant No.2007CB307100,Project No.2007CB307105) The Theory of Mobility and Sensor Network under The Integrated Network and the Universal Ap-plicable Service System
关键词 overlay network VIRUS OBSERVATION DNS 计算机病毒 覆盖网络 监测 网络节点 命名系统 硬盘驱动器 活动构造 病毒感染
  • 相关文献

参考文献12

  • 1Moore D,Paxson V,Savage S,et al.The Spread of the Sapphire/Slammer Worm[EB/OL].http://www.caida,org/outreach/papers/2003/sapphirc/,2006.
  • 2Stone R.CenterTrack:An IP Overlay Network for Tracking Denial-of-Service Floods[EB/OL].http://www,nanog,org/mtg-9910/robert,html,1999.
  • 3Keromytis A D;Misra V,and Rubenstcn D.SOS:secure overlay services[A].Proceedings of ACM SIGCOMM[C].Pittsburgh.2002.
  • 4Wang Ju,Chien A.Using Overlay Networks to Resist Denial-ofService Attacks[EB/OL].http://citeseer,ist.psu.edu/wang03using,html,2003.
  • 5Yariv K.API Spying Techniques for Windows 9x,NT and 2000[EB/OL].http://www,internals,com/articles/apispy/apispy.htm,2000.
  • 6Galen H,Doug B.Binary interception of Win32 functions[A].Proceedings of the 3rd USENIX Windows NT Symposium[C].Seattle,Washington,1999.
  • 7Markus S.Heuristic Techniques in AV Solutions:An Overview[EB/OL].http://www,securityfocus,com/infocus/1542,2002.
  • 8Microsoft Windows Script Technologies[EB/OL].http://msdn.microsoft,com/library/ default,asp? url =/library/en-us/script56/html/vtoriMicrosoftWindowsScriptTechnologies,asp,2006.
  • 9The Component Object Model:A Technical Overview[EB/OL].http://msdn,microsoft,com/library/default,asp? url =/library/en-us/dncomg/html/msdn_comppr,asp,2006.
  • 10Overview of Automation[EB/OL].http://msdn,microsoft.com/library/default,asp? url =/library/ en-us/automat/htm/chapl_3rl q.asp,2006.

二级参考文献3

  • 1NetBIOS over TCP/IP Name Resolution and WINS[EB/OL]. http://support.microsoft.com:80/support/kb/articles/Q119/4/93.asp&No WebContent=1
  • 2Liu Cricket,Albitz P.DNS and BIND (Third Edition). http://www.u-n-f.com,1998-09
  • 3Info for Hook Developers[EB/OL].http://www.develop.com/kbrown/com/hookdev.htm

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部