期刊文献+

僵尸网络检测技术研究进展 被引量:22

Overview of Botnet Detection
下载PDF
导出
摘要 僵尸网络的肆虐给互联网带来了极大的威胁,使得僵尸网络检测技术成为近年来网络安全领域的热点研究课题.首先,在对已提出的检测技术进行归纳分析的基础上,概括了僵尸网络检测的基本过程,并对这些检测技术进行了分类;然后,按照僵尸网络生命周期不同阶段的分类方法,着重分析了每种检测技术的研究思路、操作流程和优缺点;接下来,总结了现有检测技术所使用的主要方法及相应算法,提出了评价指标,并对选取的代表性技术进行了比较;最后,探讨了僵尸网络检测的关键问题及今后的研究方向. With the rapid development of botnet, the Internet has been facing the growing and disastrous threats. These threats can disable the infrastructure and cause the financial damages, which leads to a severe challenge for the global network security. In order to defense and counter the botnet, the detection is absolutely the basis. Therefore, the research on botnet detection has recently become a hot topic in the field of network security. After analyzing the proposed detection techniques, the authors present the basic process of botnet detection, and make classification for these techniques. Furthermore, according to the different stages of the life cycle of botnet, i.e., propagation, infection, communication and attack, they go into detail about main idea, detection process, merits and shortcomings of the existing techniques. Then, they summarize the approaches and the corresponding algorithms used in the detection techniques, propose the evaluation indices in the six dimensions of source, scope, real-time, accuracy, applicability and flexibility, and compare the representative techniques based on these indices. Later, they discuss the key issues of botnet detection in the fields of multi-source information collection and fusion, essential feature extraction, detection of communication and behavior, correlation analysis and detection architecture. Finally, future research trends are reviewed.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第12期2037-2048,共12页 Journal of Computer Research and Development
基金 国家自然科学基金项目(90604006) 国家"八六三"高技术研究发展计划基金项目(2009AA01Z432) 国家"九七三"重点基础研究发展计划基金项目(2009CB320503) 国家科技支撑计划基金项目(2008BAH37B03)
关键词 僵尸网络检测 僵尸网络 网络安全 生命周期 评价指标 botnet detection botnet network security life cycle evaluation index
  • 相关文献

参考文献68

  • 1Geer D.Malicious bots threaten network security[J].IEEE Computer,2005,38(1):18-20.
  • 2诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 3Rajab M,Zarfoss J,Monrose F,et al.A multi-faceted approach to understanding the botnet phenomenon[C]//Proc of the 6th ACM SIGCOMM Conf on Internet Measurement Conference(IMC'06).New York:ACM,2006:41-52.
  • 4Dean T,Marc F,Eric J,et al.Symantec global Internet security threat report:Trends for July-December 07(Volume ⅩⅢ)[R].Cupertino,CA,USA:Symantec Inc.,2008.
  • 5Marc F,Eric J,Mack T,et al.Symantec global Internet security threat report:Trends for 2008(Volume ⅩⅣ)[R].Cupertino,CA,USA:Symantec Inc,2009.
  • 6Baecher P,Koetter M,Holz T,et al.The Nepenthes platform:An efficient approach to collect malware[G]//LNCS 4219:Proc of the Int Symp on Recent Advances in Intrusion Detection(RAID'06).Berlin:Springer,2006:165-184.
  • 7程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 8Zhu Zhaosheng,Fu Zhi Judy,Lu Guohan,et al.Botnet research survey[C]//Proc of the 32nd Int Computer Software and Applications Conference.Washington,DC:IEEE Computer Society,2008:967-972.
  • 9Govil J,Govil J.Criminology of botnets and their detection and defense methods[C]//Proc of 2007 IEEE Int Conf on Electro/Information Technology(EIT2007).Washington,DC:IEEE Computer Society,2007:215-220.
  • 10Govil J.Examining the criminology of bot zoo[C]//Proc of the 6th Int Conf on Information,Communications and Signal Processing.Washington,DC:IEEE Computer Society,2007:473-478.

二级参考文献49

共引文献222

同被引文献229

引证文献22

二级引证文献139

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部