期刊文献+

一种基于状态划分的僵尸网络检测模型研究 被引量:1

A Botnet Detection Model Based on State Division
原文传递
导出
摘要 僵尸网络作为一种新型的攻击手段对互联网安全产生重大威胁,随着僵尸网络技术的快速发展,基于多种协议的僵尸网络应运而生。针对僵尸网络的特点,将隐马尔可夫模型应用于僵尸网络检测技术中。首先根据当前僵尸网络的发展状况及存在的问题分析了僵尸网络的生命周期和行为特征;然后通过状态划分的方法对僵尸网络进行数学建模,并提出一种基于该模型的僵尸网络的检测方法;最后通过实验,并对实验结果进行分析与总结,验证了检测方法的可靠性和合理性。 Botnet as a new technology of attacks is a serious threat to Intemet security. With the rapid development of the botnet, botnet based several protocols came into being. In accordance with the feature of botnet, the Hidden Markov Model has applied in botnet detection. Firstly, according to the current situation and problems of the botnet, the life cycle and behavior characteristics of the botnet have been analyzed. After that, a mathematical model based on state division has been built to describe the botnet. Meanwhile, a method of botnet detection based on this model has been proposed. Finally, we analyzed and summarized the experimental results, and verified the reliability and rationality of the detection method.
作者 万巍 李俊
出处 《科研信息化技术与应用》 2012年第2期19-24,共6页 E-science Technology & Application
基金 中国科学院知识创新工程青年人才领域前沿项目(CNIC_QN_11003)
关键词 僵尸网络 隐马尔可夫模型 状态划分 Botnet Hidden Markov Model State division
  • 相关文献

参考文献7

二级参考文献38

  • 1张相锋,孙玉芳,赵庆松.基于系统调用子集的入侵检测[J].电子学报,2004,32(8):1338-1341. 被引量:10
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4李杰君,郭芳.基于网络流量分析的入侵检测技术的研究[J].电脑知识与技术,2007(3):1229-1230. 被引量:2
  • 5JAKOBSSON M, RAMZAN Z. Cfimeware: Understanding new attacks and defenses[ M]. New York: Addison Wesley, 2008.
  • 6Enterprise firewall [EB/OL]. [2009 - 10 - 02]. http://paloalton- etworks. com/.
  • 7WANG PING, WU LEI, CUMMINGHAM R, et al. Honeypot detection in advanced Botnet attacks[ J]. International Journal of Information and Computer Security, 2010,4(1) : 30 -51.
  • 8NUMMIPURO A. Detecting P 2 P - controlled bots on the host [EB / OL]. [2009 - 10 -05]. http://citeseerx. ist. psu. edu/viewdoc/download.
  • 9GU GUOFEI, PORRAS P, YEGNESWARAN Y, et al. BotHunter: Detecting malware infection through IDS-driven dialog conelation[C]// Proceedinga of 16th USENIX Security Symposium on USENIX Security Symposium. Berkeley: USENIX Association, 2007: 167-182.
  • 10NOH S K, OH J H, LEE J S, et al. Detecting P2P botnets using a multi-phased flow model[ C]// Proceedings of the 2009 3rd International Conference on Digital Society. Washington, DC : IEEE Computer Society, 2009:247 -253.

共引文献189

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部