期刊文献+

基于Command and Control通信信道流量属性聚类的僵尸网络检测方法 被引量:9

Botnet Detecting Method Based on Clustering Flow Attributes of Command and Control Communication Channel
下载PDF
导出
摘要 僵尸网络(Botnet)是一种从传统恶意代码形态进化而来的新型攻击方式,为攻击者提供了隐匿、灵活且高效的一对多命令与控制信道(Command and Control channel,C&C)机制,可以控制大量僵尸主机实现信息窃取、分布式拒绝服务攻击和垃圾邮件发送等攻击目的。该文提出一种与僵尸网络结构和C&C协议无关,不需要分析数据包的特征负载的僵尸网络检测方法。该方法首先使用预过滤规则对捕获的流量进行过滤,去掉与僵尸网络无关的流量;其次对过滤后的流量属性进行统计;接着使用基于X-means聚类的两步聚类算法对C&C信道的流量属性进行分析与聚类,从而达到对僵尸网络检测的目的。实验证明,该方法高效准确地把僵尸网络流量与其他正常网络流量区分,达到从实际网络中检测僵尸网络的要求,并且具有较低的误判率。 Botnet is a novel attack strategy evolved from traditional malware forms; It provides the attackers stealthy, flexible and efficient one to many Command and Control (C&C) mechanisms, which can be used to order an army of zombies to achieve the goals including information theft, launching Distributed Denial of Service (DDoS), and sending spam. This paper proposed a botnet detecting method which independent of botnet C&C protocol and structure, and not analysis payload of packets. At first this method use pre-filter rules to filter flow which have irrelevant with botnet; Second, the flow attributes are analyzed; Third, two-steps clustering algorithm which based on X-means clustering is used to analyze and cluster flow attributes of C&C channel, and the botnet detection is implemented. The experiment shows that this method can differentiate traffic of botnet and normal network with high accuracy, low false positive, achieve the goal that detects botnet under real network environment.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第8期1993-1999,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金项目(61173167 61173168 61070194) 国家发改委信息安全专项资助课题
关键词 网络检测 聚类 僵尸网络检测 命令与控制信道 流量属性 Network detection Clustering Botnet detection Command and Control (C&C) channel Flowattributes
  • 相关文献

参考文献26

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2Shin Seungwon and Gu Guofei. Conficker and beyond: alarge-scale empirical study[C]. Proceedings of 2010 AnnualComputer Security Applications Conference (ACSAC’10),Austin, Texas, USA, 2010: 151-160.
  • 3Chia Yuan-cho, Juan Caballero, Grier C, et al.. Insights fromthe inside: a view of botnet management from infiltration[C].Proceedings of the USENIX Workshop on Large-ScaleExploits and Emergent Threats (LEET), San Jose, CA, USA,2010: 1-8.
  • 4Yen T F and Reiter M K. Are your hosts trading or plotting?telling P2P file-sharing and bots apart[C]. IEEE 30thInternational Conference on Distributed Computing Systems(ICDCS), Genoa, Italy, 2010: 241-252.
  • 5Wang Ping, Sparks S, and Zou C. An advanced hybridpeer-to-peer botnet[J]. IEEE Transactions on Dependableand Secure Computing, 2010, 7(2): 113-127.
  • 6Lemos R. Bot software looks to improve peer-age[OL].http:// www.securityfocus.com/ news/11390, 2006.
  • 7Holz T, Steiner M, Dahl F, et al.. Measurements andmitigation of peer-to-peer-based botnets: a case study onstorm worm[C]. Proceedings of the First USENIX Workshopon Large-Scale Exploits and Emergent Threats (LEET’08),San Francisco, CA, USA, 2008: 88-96.
  • 8Wang Ying, Jin Zhi-gang, and Zhang Wei. Analysis of botnetattack and defense technology[C]. Computer Science andService System (CSSS), Pairs, France, 2011: 3021-3023.
  • 9Baecher P, Koetter M, Holz T, et al.. The nepenthes platform:an efficient approach to collect malware[C]. Proceedings ofInternational Symposium on Recent Advances in IntrusionDetection (RAID’06), Hamburg, September 2006, Vol. 4219:165-184.
  • 10Rajab M, Zarfoss J, Monrose F, et al.. A multi-facetedapproach to understanding the botnet phenomenon[C].Proceedings of ACM SIGCOMM/USENIX InternetMeasurement Conference (IMC’06), Brazil, October 2006:41-52.

二级参考文献4

共引文献156

同被引文献55

引证文献9

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部