期刊文献+

Zero-day攻击多态蠕虫研究与进展

Research and Development of Zero-day Polymorphic Worm
下载PDF
导出
摘要 随着计算机网络的不断普及与发展,网络蠕虫已经成为网络系统安全的重要威胁之一。近年来,网络蠕虫又有了新的变化,出现了新的Zero-day攻击多态蠕虫,这种蠕虫采用"多态"技术并以"Zero-day漏洞"为攻击目标,可在短时间内有效地避开检测系统,成为未来互联网安全的一大隐患。因此,研究Zero-day攻击多态蠕虫及其检测技术是非常必要的。首先论述了Zero-day攻击多态蠕虫的攻击原理,接着对近几年提出的基于网络流过滤和模拟执行检测等方法进行了分析、总结,最后给出一些热点问题及展望。 With the increasing popularity and development of computer network,internet worms have become one of the important network system security threats.In recent years,internet worms have a new change that is Zero-day polymorphic worms,which could use metamorphic techniques and regard Zero-day vulnerabilities as its attack targets,it can evade the detection of the existing IDSes in short time.Therefore,research Zero-day polymorphic worms and detection technique is very necessary.Zero-day polymorphic worm's attack mechanism is firstly presented,then some network-sifting and simulation-based detection techniques in recent years are analysed and concluded,and finally some hot questions are provided.
出处 《计算机技术与发展》 2011年第9期216-220,共5页 Computer Technology and Development
基金 国家自然科学基金(60503008)
关键词 网络安全 Zero-day攻击 多态蠕虫 network security Zero-day attack polymorphic worm
  • 相关文献

参考文献21

  • 1Spafford E H. The lnternet Worm Program: An analysis[ R]. West Lafayette: Department of Computer Science, Purdue University, 1988 : 1-29.
  • 2EEye Digital Security. Code Red worm[ EB/OL]. 2001. http ://www. eeye. com/html/research/advisories/a120010717. html.
  • 3潘春华,刘寿强,张健,黄伟.“冲击波”蠕虫病毒解析与防治[J].计算机安全,2003(31):68-72. 被引量:1
  • 4陶金.从“熊猫烧香”看新型网络病毒的特点和防御方法[J].辽宁师专学报(自然科学版),2007,9(1):50-50. 被引量:1
  • 5Paxson V. Bro : a system for detecting network intruders in real - time [ C ]//Proceedings of the 7th USENIX Security Symposium. San Antonio, TX : USENIX Association, 1998 : 31 - 51.
  • 6王清.Oday安全:软件漏洞分析技术[M].北京:电子工业出版社,2008.
  • 7李岱.基于零日漏洞攻击的原理与防范[J].电脑知识与技术,2009,5(11X):9394-9395. 被引量:3
  • 8徐晓萌,郭山清,徐秋亮.多态蠕虫的研究与进展[J].计算机科学与探索,2008,2(2):131-138. 被引量:7
  • 9张岗岭,何聚厚.基于模拟执行的恶意行为检测模型研究[D].西安:陕西师范大学,2010.
  • 10Kim H A, Karp B. Autograph : toward automated, distributed worm signature detection[ C ]//Proceedings of the 13th USENIX Security Symposium. [ s. l. ] : [ s. n. ] ,2004.

二级参考文献3

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部