期刊文献+

一种p2p Botnet在线检测方法研究 被引量:10

The p2p Botnet Online Detect Approach Research
下载PDF
导出
摘要 文章详细分析了p2p僵尸网络的生命周期以及网络特征,利用改进的SPRINT决策树和相似度度量函数,提出了一种新的在线综合检测方法,并论述了虚拟机环境搭建、原型系统设计和实验结果分析.实验结果表明,检测方法是可行的,具有较高的效率和可靠性. The life cycle and network characteristics of p2p botnet was analyzed,improved sprint method and similarity function was discussed and new online detect approach was proposed.Secondly,the virtual machine network environment,the design of prototype system and the analysis of the experiment result was discussed.The result shows that the detection approach is feasible,high efficient and reliable.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第4期906-912,共7页 Acta Electronica Sinica
基金 国家重点基础研究发展计划(973计划)(No.2009CB320706) 吉林省科技发展计划资助项目(No.20090111)
关键词 僵尸网络 对等网络 检测 botnet p2p network detect
  • 相关文献

参考文献15

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2M A Rajah, J Zarfoss,F Monrose,A Terzis. A multifaceted approach to understanding the botnet phenomenon [ A ]. Proc of the 6th ACM SIGCOMM on Intemet Measurement Conference [C]. Rio de Janeriro: Association for Computing Machinery, 2006.41 - 52.
  • 3J B Grizzard, V Sharma, C Nunnery, B B Kang, D Dagon. Peer-to-peer botnets: Overview and case study [ A ]. Proc USENIX HotBots' 07 [ C ]. Berkeley: USENIX Association, 2007.78 - 83.
  • 4J R Binkley, S Singh. An algorithm for anomaly-based bomet detection[ A] .Proceedings of USENIX SRUTI' 06- C]. Berkeley: USENIX Association, 2006.43 - 48.
  • 5J Goebel, T Holz. Rishi: Identify bot contaminated hosts by irc nickname evaluation[ A]. Proceedings of USENIX HotBots' 07 [ C ]. Berkeley: USENIX Association, 2007.53 - 60.
  • 6C Livadas,R Walsh, D Lapsley, W T Strayer. Using machine learning techniques to identify hornet traffic[ A] .Proceedings of the 2nd IEEE LCN Workshop on Network Security[C ]. Tampa: IEEE Computer Society,2006.967- 974.
  • 7W T Strayer, R Walsh, C Livadas, D Lapsley. Detecting botnets with tight command and control[ A ]. Proceedings of the 31st IEEE Conference on Local Computer Networks ( LCN' D6)C]. Tampa: IEEE Computer Society. 195 - 202.
  • 8R Lemos. Bot software looks to improve peerage[ EB/OL]. Http://www. securityfocus. com/news/11390,2006.
  • 9Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee. Bot- Miner:Clustering analysis of network Waffle for protocol- and structure-independent hornet detection[ A ]. Proceedings of the 17th USENIX Security Symposium (Security' 08) [C]. Berkeley: USENIX Association,2008. 139- 154.
  • 10Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong. Detecting p2p bothers using a multiphased flow model[ A] .3rd International Conference on Digital Society[C]. Cancun: Computer Society,2009.247 - 253.

二级参考文献4

共引文献156

同被引文献72

引证文献10

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部