期刊文献+

网络恶意程序“Botnet”的检测技术的分析 被引量:1

Analysis of Detection Technology to Web Malware "Bornet"
下载PDF
导出
摘要 目前Botnet技术发展最为快速,不论是对网络安全运行还是用户数据安全的保护来说,Botnet都是极具威胁的隐患。介绍了Botnet技术的同时也对Botnet检测技术进行了研究,对几种主要的Botnet检测技术进行了深入分析。 The fastest growing Botnet technology, whether it is running on the network or user security protection for data security, Botnets are the most perilous pitfalls. This paper describes the Botnet, while also Bother detection techniques have been studied for several major Bother detection techniques in-depth analysis.
作者 倪红彪
机构地区 吉林警察学院
出处 《煤炭技术》 CAS 北大核心 2011年第12期172-173,共2页 Coal Technology
关键词 BOTNET 安全 检测技术 Botnet security detection technique
  • 相关文献

参考文献6

  • 1李金良僵尸网络及其防御研究[D].中国优秀硕士学位论文全文数据库,2007.
  • 2沈利香.僵尸网络传播模式分析和防治对策[J].常州工学院学报,2008,21(6):38-42. 被引量:3
  • 3苏云琳.僵尸网络检测系统的分析与设计[D].中国优秀硕士学位论文全文数据库,2010.
  • 4陆伟宙,余顺争.僵尸网络检测方法研究[J].电信科学,2007,23(12):71-77. 被引量:7
  • 5Kang Jian,Zhang Junyao.Application entropy theory to detect new peer-to-peer botnet with multi-chart CUSUM[C]//Proeeed- ings of the 2nd International Symposium on Electronic Com- merce and Security, 2009.
  • 6Zhu Zhaosheng, Fu Zhi Judy, Lu Guohan, et al. Botnet re- search survey [C]//Proe of the 32nd Int Computer Software and Applications Conference. 2008.

二级参考文献28

  • 1国务院信息化工作办公室.中国信息化发展报告2006[R/OL].[2008-08-06].http://www.acsi.gov.cn/WebSite/ACSI/UpFile/File149.pal.
  • 2Barford P,Yegneswaran V.An inside look at bothers[J].Advances in Information Security,Malware Detection Springer-Verlag,2007(27):171-191.
  • 3Rajah MA,Zarfoss J,Monrose F,et al.Security and privacy:A multifaeeted approach to understanding the botnet phenomeno[C]//Alraeia,a JM,Almeida VAF,Barford P,eds.Proc.of the 6th ACM Internet Measurement Conf.(IMC 2006).Rio de Janeriro:ACM Press,2006(b):41-52.
  • 4John Canavan.The evolution of malicious IRC bots,symantec security response(from the proceedings of the VB2005 conference)[C/OL].[2008-08-06].http://www.symantec.com/aveenter/reference/the.evolution.of.malicious.irc.bots.pdf.
  • 5Bachcr P,Holz T,Kotter M,et al.Know your enemy:Tracking botnets[R/OL].[2008-08-06].http://www.honeynet.org/papers/bots.
  • 6Daswani N,Stoppelman M.The anatomy of cliekbot.A[(C/OL].In:Proe.of the 1st workshop on hot topics in understanding bothers(HotBots 2007).[2008-08-06].http://portal.acm.org/citation.cfm?id=1323128.1323139 & coll=GUIDE & dl=GUIDE & CFID=16751383 & CFrOKEN=82837820.
  • 7魏亮.电信业信息当前安全工作及进展[R/OL].[2008-08-06].http://sj.media.edu.cn/2007anquan/pdf/weiliang.pdf.
  • 8诸葛建伟,韩心慧,叶志远,等.僵尸网络的发现与跟踪[C].全国网络与信息安全技术研讨会,2005.
  • 92006 Annual Report by CNCERT/CC,www.cert.org.cn/english_Web/ document/2006AnnualReportByC NCERT.pdf.
  • 10Barford P, Yegneswaran V. An inside look at botnets, in series: advances in information security, Springer, 2006.

共引文献7

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部