期刊文献+

僵尸网络检测研究 被引量:1

The Research of Botnet Detection
下载PDF
导出
摘要 僵尸网络是一种严重威胁网络安全的攻击平台。文章先给出僵尸网络的定义,然后分析其工作机制,命令与控制机制。针对当前主流的僵尸网络检测方法,按照不同的行为特征进行分类,根据僵尸网络的静态特征、动态特征以及混合特征,对当前的主要检测方法进行了归纳、分析和总结。并在文章最后提出,建立一个完备的僵尸网络检测模型需要将僵尸网络的动态特征检测模型与静态特征检测模型相互结合,而这才是僵尸网络检测模型未来发展的重点。 Botnets as a serious threat to network security attack platform,due to its difficult to find the controller,is favored by the majority of hackers.Based on a clear definition of zombie networks,this article first analyzes its command and control mechanism.Then it describes some of the popular methods of detecting botnets and analysis on the methods according to the dynamic features,static features and compound characteristics for classification.Finally,it is proposed that to establish the comprehensive botnet detection,the dynamic and static characteristics detections need to be combined,and this will make the bonet detection more effective and accurate.
出处 《现代电信科技》 2010年第10期44-49,共6页 Modern Science & Technology of Telecommunications
基金 国家自然科学基金(No.60873097) 重庆市自然科学重点基金(No.CSTC2009BA2089)资助
关键词 网络安全 僵尸网络 僵尸网络检测 network security botnet botnet detection
  • 相关文献

参考文献27

  • 1Symantec Inc. Symantec Intemet security threat report: Trends for January 06-June 06. Volume X. http://eval.symantec.com/mktginfo/enterprise/white_papers/ent-whitepaper_symantec_intemet_security_threat_report_ix.pdf 2006.
  • 2Symantec Inc. Symantec Internet security threat report: Trends for July 06-December 06. Volume XI. http://eval.symantec.com/mktginfo/enter- prise/white_papers/ent-whitepaper_symantec_internet_security_threat_report_x 09 2006.en-us.pdf. 2007.
  • 3陈明奇.僵尸网络的威胁与应对.CNCERT/CC.2006年8月.
  • 4McCarty B. IEEE Security & Privacy. 1 (4):87-90. Botnets: Big and bigger. 2003.
  • 5Bacher P, Holz T, Kotter M, et al. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots 2005.
  • 6诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 7Barford P, Yegneswaran V. An inside look at botnets. In: Christodorescu M, Jha S, Maughan D, Song D, Wang C, eds. Advances in Information Security, Malware Detection, Vol.27. Springer-Verlag, http://www. springerlink.com/content/w4576m3186524245/2007.
  • 8Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani. Automatic discovery of botnet communities on large-scale communication networks, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security. Sydney, Australia, March 10-12, 2009.
  • 9Strayer T, Walsh R, Livadas C, et at. Detecting botnets with tight command and control. In: Proc. of the 31st IEEE Conf. on Local Computer Networks (LCN'06). Tampa: IEEE Computer Society Press, 195-202. 2006.
  • 10Kah C. RFC 2810: lntemet relay chat: Architecture. RFC 2810, IETF, 2000.

二级参考文献31

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2杜跃进,崔翔.僵尸网络及其启发[J].中国数据通信,2005,7(5):9-13. 被引量:14
  • 3张兆心,方滨兴,胡铭曾.支持IDS的高速网络信息获取体系结构[J].北京邮电大学学报,2006,29(2):118-122. 被引量:1
  • 4孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 5金双民,郑辉,段海新.僵尸网络研究系列文章之二 设计自动识别系统[J].中国教育网络,2006(7):44-46. 被引量:4
  • 6Oikarinen J, Reed D. Internet relay chat protocol. Request for Comments (RFC) 1459, IETF, May, 1993.
  • 7Malan D J. Rapid detection of botnets through collaborative networks of peers [Ph. D. dissertation]. Harvard University, Cambridge, Massachusetts, 2007.
  • 8Al-Hammadi Y, Aickelin U. Detecting bomets through log correlation//Proceedings of the IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation. Tuebingen, Germany, 2006: 97-100.
  • 9Binkley J R, Singh S. An algorithm for anomaly-based botnet detection//Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet. San Jose, CA, 2006:43-48.
  • 10Strayer W T, Walsh R et al. Detecting botnets with tight command and control//Proceedings of the 31st IEEE Conference on Local Computer Networks. Tampa, FL, 2006:195-202.

共引文献170

同被引文献7

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部