期刊文献+

僵尸网络中的关键问题 被引量:23

Some Critical Problems of Botnets
下载PDF
导出
摘要 僵尸网络是一种复杂、灵活、高效的网络攻击平台,在互联网中分布非常广泛.僵尸网络使攻击者具备了实施大规模恶意活动的能力,如发送垃圾邮件、发动分布式拒绝服务攻击等.由于其危害日益严重,僵尸网络已经成为网络安全研究的热点之一.但是近年来,僵尸网络新的发展、变化,突破了以往对僵尸网络的认知.文中分析僵尸网络的现有研究,对僵尸网络进行了重新定义,并从网络结构、网络独立性和信息传递方式等角度对僵尸网络的类型进行了划分;然后,梳理了僵尸网络检测技术、测量技术和反制技术等方面的工作;最后,给出了僵尸网络的演化趋势和未来研究方向. As a complex, flexible and effective platform for network attacking, the botnet spreads widely in the Internet. Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as spamming and DDoS (Distributed Denial of Service) attacks. Botnets are continuously bringing more and more severe threats, so that the study on hotnets has already become one of the focuses in the field of network security. However, in recent years, some new developments of botnets are challenging the existing understanding on botnets. In this paper, according to the new conditions of botnets and the researches in existence, a definition of botnet is proposed based on the works of other researchers, taxonomies of botnets are introduced respectively from the views of network structure, dependency and delivery pattern of C&C (Command and Control) information. Then the techniques on detecting, measuring and restraining botnets are analyzed systematically. In the end, we give the evolution trends of botnets and the future research trends in this area.
出处 《计算机学报》 EI CSCD 北大核心 2012年第6期1192-1208,共17页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金"高效可信的虚拟计算环境基础研究"(2011CB302600) 国家自然科学基金"大型分布式软件系统的行为监控与可信演化"(90818028) 国家杰出青年科学基金(60625203)资助~~
关键词 志愿僵尸网络 自部署僵尸网络 测量技术 检测技术 反制技术 僵尸网络演化趋势 volunteer botnet self owned botnet botnet detection botnet measurement botnetrestrain evolution tendency of botnets
  • 相关文献

参考文献2

二级参考文献11

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3BAECHER P, HOLZ T, KOETTER M, et al. Know your enemy: tracking botnets, using honeynets to learn more about bots[EB/OL]. http://www.honeynet.org/papers/ bots/, 2005. Accessed March 2007.
  • 4WATSON D, HOLZ T, MUELLER S. Know your enemy: phishing[EB/OL], http://www.honeynet.org/papers/phishing/,2005. Accessed March 2007.
  • 5PROVOS N. A virtual honeypot framework[A]. Proceedings of 13th USENIX Security Symposium[C]. San Diego, CA, USA, 2004. 1-14.
  • 6BALAS E, VIECCO C. Towards a third generation data capture architecture for honeynets[A]. Proceeedings of the 6th IEEE Information Assurance Workshop[C]. West Point, NY, USA, 2005.
  • 7BAECHER P, KOETTER M, HOLZ T, et al. The nepenthes platform: an efficient approach to collect malware[J]. Lecture Notes in Computer Science 4219, 2006, 165-184.
  • 8ZIMMER D. Multipot[EB/OL]. http://labs.idefense.com/software/malcode. php, 2006. Accessed March 2007.
  • 9LEVINE J, GRIZZARD J, OWEN H. Application of a methodology to characterize rootkits retrieved from honeynets[A]. Proceedings of the Fifth Annual Information Assurance Workshop[C]. West Point, NY, USA, 2004. 15-21.
  • 10诸葛建伟,韩心慧,周勇林,宋程昱,郭晋鹏,邹维.HoneyBow:一个基于高交互式蜜罐技术的恶意代码自动捕获器[J].通信学报,2007,28(12):8-13. 被引量:44

共引文献192

同被引文献151

引证文献23

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部