期刊文献+

僵尸网络传播模型分析 被引量:4

Botnet propagation modeling and analysis
下载PDF
导出
摘要 为了让僵尸网络传播模型是更符合Internet中的僵尸网络的传播特性,基于简单病毒传播模型深入分析僵尸程序的传播特性,考虑了僵尸程序在传播过程中存在的网络流量阻塞、提前免疫主机和感染后免疫主机等因素,提出了一个新的僵尸网络传播模型,并进行了仿真实验。实验结果表明,该模型更符合僵尸程序在复杂网络中的传播特性,有利于僵尸网络的传播行为的分析和传播趋势的预测。 In order to make the Botnet propagation modeling is more in line with the spread of the Botnet Intemet characteristics. This paper analyzes the propagation characteristics of Botnet based on the SIR mode, considers the network traffic congestion and existing immune host in the process of the spread of bots, puts forward a new propagation modeling of Botnet, and conducts simula-tion experiment. The results of the software simulation show that the new Botnet propagation modeling is more accord with Internet network characteristics, and makes for the analysis of the Botnet communication behavior and forecasting the trend of spread.
出处 《计算机工程与应用》 CSCD 2013年第1期107-111,共5页 Computer Engineering and Applications
基金 国家自然科学基金面上项目(No.60970113) 四川师范大学研究生科研创新基金(校研字[2012]6号)
关键词 网络安全 僵尸网络 传播模型 流量阻塞 免疫 network security Botnet propagation model network traffic congestion immunity
  • 相关文献

参考文献15

  • 1Schiller G A, Binkley J, Harley D, et al.Botnets the killer Web app[M].北京:科学出版社,2009.
  • 2正常主机变身僵尸网络服务器曝中国十大黑客案例[N/OL].人民日报(2010-12-01).http://news.e23.cn/Content/2010-12-01/2010C0100018.html#.
  • 3McCarty B.Botnets:big and bigger[J].IEEE Security and Pri- vacy, 2003,1 (4) : 87-90.
  • 4Purl R.Bots and Botnet:an overview[EB/OL].SANS White Paper ( 2003 ) .http ://www.sans.org/reading_room/whitepapers/malicious/ 1299.php.
  • 5Bacher P, Holz T, Kotter M, et al.Know your enemy: tracking Botnets[EB/OL]. ( 2005 ) .http ://www.honeynet.org/papers/bots.
  • 6Zhuge J W, Han X H, Ye Z Y, et al.Discover and track Botnets[C]//Proc of the Chinese Symp on Network and Information Security(NetSec 2005) ,2005 : 183-189.
  • 7Arce I, Levy E.An analysis of the slapper worm[J].IEEE Security and Privacy, 2003 ( 1 ) :82-87.
  • 8Rajab M A, Zarfoss J, Monrose F, et al.Amultifaceted approach to understanding the Botnet phenomenon[C]//Almeida J M, Almeida V A F, Barford P.Proc of the 6th ACM Internet Measurement Conf(IMC 2006).Rio de Janeriro:ACM Press, 2006:41-52.
  • 9Binkley J R, Singh S.An algorithm for anomaly-based Botnet detection[C]//Proc of the USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Intemet(SRUTI 2006), 2006 : 43-48.
  • 10Binkley J R.Anomaly-based Botnet server detection[C]//Proc of the FloCon Analysis Workshop,2006.

二级参考文献5

  • 1Grizzard J B,Sharma V,Nunnery C,et al.Peer-to-Peer Botnets:Overview and Case Study[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 2Noh Sang-Kyun,Oh Joo-Hyung,Lee Jae-Seo,et al.Detecting P2P Botnets Using a Multi-phased Folw Model[EB/OL].(2009-03-30).http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4782883.
  • 3Gu Guofei,Porras P,Yegneswaran V,et al.BotHunter:Detecting Malware Infection Through IDS-driven Dialog Correlation[C] // Proc.of the 16th USENIX Security Symposium.Boston,USA:[s.n.] ,2007.
  • 4Wang Ping,Sparks S,Zou C C.An Advanced Hybrid Peer-to-Peer Botnet[C] //Proc.of the 1st Workshop on Hot Topics in Understanding Botnets.Boston,USA:[s.n.] ,2007.
  • 5诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157

共引文献5

同被引文献19

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部