期刊文献+

一种新型的P2P僵尸网络检测模型 被引量:1

A New Detect Model of the Botnet Based on P2P
下载PDF
导出
摘要 僵尸网络已经给当前的计算机网络安全带来严重的安全威胁,特别是僵尸网络在融合对等网络作为通信技术之后,僵尸网络大大提高了其生存能力,为有效降低采用P2P技术的僵尸网络带来的安全威胁,如何有效检测出基于P2P技术的僵尸网络成为一个热点。针对这种现状提出了一种基于P2P技术的Botnet检测模型。 The botnet has brought a serious security threat to the current computer network , especially the botnet using P2P network as communication technology, greatly improves their ability to survive, in order to effectively reduce security threats brought by the P2P botnet , how to effectively detect hornet based on the P2P technology has become a zombie hot spot, this article in view of this situation, proposed one new kind of BOther detection model which based on the P2P technology.
出处 《软件导刊》 2012年第9期148-149,共2页 Software Guide
基金 国家自然科学基金项目(No.61103143) 河南省高校科技创新人才支持计划项目(No.2012HASTTT032) 河南省科技厅基础与前沿技术研究计划项目(112300410307)
关键词 僵尸网络 检测模型 对等网络 模糊逻辑 Botnet Detection Peer-To-Peer Network Fuzzy Logic
  • 相关文献

参考文献5

  • 1BINSALLEEH H,ORMEROD T,BOUKHTOUTA A. On the analysis of the Zeus botnet crimeware toolkit[A].2010.
  • 2E COOKE,F JAHANIAN,D.MCPHERSON. The zombie roundup:understanding,detecting,and disrupting botnets[J].Proceedings of USENIX WOrkshop on Steps to Reducinng Unwanted Traffic on the Internet,2005,(07).
  • 3GRIZZARD JB,SHARMA V,NUNNERY C. Peer-to-Peer botnets:overview and case study[A].2007.
  • 4HOLZ T,STEINER M,DAHL F. Measurements and mitigation of peer-to-peer-based botnets:a case study on storm worm[A].San Francisco:USENIXAssociation,2008.
  • 5柴胜,胡亮,梁波.一种p2p Botnet在线检测方法研究[J].电子学报,2011,39(4):906-912. 被引量:10

二级参考文献15

  • 1C Livadas,R Walsh, D Lapsley, W T Strayer. Using machine learning techniques to identify hornet traffic[ A] .Proceedings of the 2nd IEEE LCN Workshop on Network Security[C ]. Tampa: IEEE Computer Society,2006.967- 974.
  • 2W T Strayer, R Walsh, C Livadas, D Lapsley. Detecting botnets with tight command and control[ A ]. Proceedings of the 31st IEEE Conference on Local Computer Networks ( LCN' D6)C]. Tampa: IEEE Computer Society. 195 - 202.
  • 3R Lemos. Bot software looks to improve peerage[ EB/OL]. Http://www. securityfocus. com/news/11390,2006.
  • 4Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee. Bot- Miner:Clustering analysis of network Waffle for protocol- and structure-independent hornet detection[ A ]. Proceedings of the 17th USENIX Security Symposium (Security' 08) [C]. Berkeley: USENIX Association,2008. 139- 154.
  • 5Sang-Kyun Noh, Joo-Hyung Oh, Jae-Seo Lee, Bong-Nam Noh, Hyun-Cheol Jeong. Detecting p2p bothers using a multiphased flow model[ A] .3rd International Conference on Digital Society[C]. Cancun: Computer Society,2009.247 - 253.
  • 6Jian Kang,Jun-Yao Zhang, Qiang I.,i,Zhuo li.Detecling new p2p bomet with multi-chart CUSUM[ A ]. Internalional Conference on Networks Security, Wireless Communications and Trusted Computing[C]. Wuhan: Computer Society, 2009. 688 -691.
  • 7Mohammad M Masud, Jing Gao, Latifur Khan, Jiawei Han, Bhavani Thuraisingham. A multi-partition multi-chunk ensemble technique to classify concept-drifting data streams [ A ]. Proceedings of The 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining ( PAKDD' 09 ) [ C ]. Bangkok, Thailand: Springer Vedag,2009. 363 - 375.
  • 8Ping Wang,Lei Wu.A systematic study on Peer-to-Peer Botnets[ A ]. Computer Communications and Networks [ C ]. San Francisco: Institute of Electrical and Electronics Engineers Inc,2009. 121 - 128.
  • 9Shafer J,Agrawal R, Mehta M. SPRINT: A scalable parallel classifier for data mining[ A]. Proceedings of the 1996 International Conference on Very Large Data Bases. Bombay[ C]. San Francisco: Morgan Kaufmann Publishers Inc, 1996. 544 - 555.
  • 10Liu, Youjun. Improvement of SPRINT algorithm[ J ]. Jisuanji Gongcheng/Computer Engineering, 20-, 32(16) :55 - 57.

共引文献9

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部