期刊文献+

僵尸网络机理与防御技术 被引量:63

Research on Botnet Mechanisms and Defenses
下载PDF
导出
摘要 以僵尸网络为载体的各种网络攻击活动是目前互联网所面临的最为严重的安全威胁之一.虽然近年来这方面的研究取得了显著的进展,但是由于僵尸网络不断演化、越来越复杂和隐蔽以及网络和系统体系结构的限制给检测和防御带来的困难,如何有效应对僵尸网络的威胁仍是一项持续而具有挑战性的课题.首先从僵尸网络的传播、攻击以及命令与控制这3个方面介绍了近年来僵尸网络工作机制的发展,然后从监测、工作机制分析、特征分析、检测和主动遏制这5个环节对僵尸网络防御方面的研究进行总结和分析,并对目前的防御方法的局限、僵尸网络的发展趋势和进一步的研究方向进行了讨论. Botnets are one of the most serious threats to the Internet. Researchers have done plenty of research and made significant progress. However, botnets keep evolving and have become more and more sophisticated. Due to the underlying security limitation of current system and Internet architecture, and the complexity of botnet itself, how to effectively counter the global threat ofbotnets is still a very challenging issue. This paper first introduces the evolving of botnet's propagation, attack, command, and control mechanisms. Then the paper summarizes recent advances of botnet defense research and categorizes into five areas: Botnet monitoring, botnet infiltration, analysis of botnet characteristics, botnet detection and botnet disruption. The limitation of current botnet defense techniques, the evolving trend ofbotnet, and some possible directions for future research are also discussed.
出处 《软件学报》 EI CSCD 北大核心 2012年第1期82-96,共15页 Journal of Software
基金 国家自然科学基金(61003127) 国家重点基础研究发展计划(973)(2009CB320505)
关键词 网络安全 僵尸网络 命令与控制 僵尸网络测量 僵尸网络检测 network security botnet command and control botnet measurement botnet detection
  • 相关文献

参考文献2

二级参考文献19

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3MIRKOVIC J, REIHER P. A taxonomy of DDoS attack and DDoS denfence machanisims[ J]. ACM SIGCOMM Computer Communications Review, 2004, 34(2) : 2 -3.
  • 4周勇林.僵尸网络的威胁和应对措施[R].国家计算机网络应急技术处理协调中心,2005.
  • 5OIKARINEN J. IRC history by Jarkko Oikarinen[ EB/OL]. http://www. irc. org/history_docs/jarkko.html, 1998.
  • 6The honeynet project & research alliance. Know your enemy: tracking botnets[EB/OL].http://project.hoceynet.org/papers/bots/, 2005 -03.
  • 7PURI R. Bots & Botnet: an overview[ A]. GSEC practical Assignment Version 1.4b[ C].2003.6 -7.
  • 8MCCARTY B. Botnets: big and bigger[J]. IEEE Security & Privacy, 2003, 1(4).
  • 9DAGON D , ZOU C, LEE W. Modeling botnet propagation using time zones[ A]. 13th Annual Network and Distributed System Security Symposium (NDSS) [C].2006.
  • 10HARDIN JD. The scanner tarpit howto [EB/OL]. http://www. inpsec.org/linax/security/scanner-tarp it.html, 2002.

共引文献172

同被引文献451

引证文献63

二级引证文献362

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部