期刊文献+

僵尸网络命令与控制信道的特征提取模型研究 被引量:9

Signature generation model for botnet command and control channel
下载PDF
导出
摘要 僵尸网络发起的分布式拒绝服务攻击、垃圾邮件发送以及敏感信息窃取等恶意活动已经成为网络安全面临的重要威胁。命令与控制信道正是僵尸网络操纵这些恶意活动的唯一途径。利用命令与控制信道中攻击命令具有相对固定的格式和命令字的特点,基于现有的特征提取技术,针对边缘网络的可疑流量,提出了一个新型的特征提取模型。实验结果表明,该模型能够准确地提取出具有命令格式的特征,而且由这些特征转化的入侵检测规则能够有效识别感染的僵尸主机。 The malicious activities such as distributed denial of service attack, spam sending, and sensitive information theft launched by botnet have been the serious threats to Internet security. Command and control channel is the only way for botnet to manipulate these malicious activities. With the features of relatively fixed command format and string in the command and control channel, a novel signature generation model is proposed based on the existing techniques of signature generation, which focuses on the edge network’s suspect traffics. Experiment results show that the proposed model can generate accurate signatures conforming to the command format. Furthermore, the intrusion detection rules generated from these signatures can be used to identify the zombies effectively.
出处 《计算机工程与科学》 CSCD 北大核心 2013年第2期62-67,共6页 Computer Engineering & Science
基金 国家自然科学基金资助项目(61070200 61003303) 国家科技支撑计划资助项目(2008BAH37B03) 国家863计划资助项目(2009AA01Z432) 国家973计划资助项目(2009CB320503)
关键词 僵尸网络 网络安全 命令与控制信道 特征提取 入侵检测 botnet network security command and control channel signature generation intrusion detection
  • 相关文献

参考文献7

二级参考文献172

共引文献217

同被引文献76

  • 1刘勃,周荷琴.基于贝叶斯网络的网络安全评估方法研究[J].计算机工程,2004,30(22):111-113. 被引量:15
  • 2PONTES E, GUELFI A E.IFS-intrusion forecasting system based on collaborative architecture[C]//Proc ofICDIM.2009:217-222.
  • 3ISHIDA C, ARAKAWA Y, SASASE I.Forecast techniques for predicting increase and decrease of attacks using Bayesian inference[C]//Proc of IEEE PACRIM.2005:450-453.
  • 4刘一静,孙莹,蔺洋.基于手机病毒攻击方式的研究[J].信息安全与通信保密,2007,29(12):96-98. 被引量:17
  • 5SymbOS. Exy. A [ EB/OL ]. 2009. http ://www. symantec. com/security_response/writeup, jsp? docid = 2009- 022010- 4100-99.
  • 6Asrar I. Could sexy space be the birth of the sms botnet? [ EB/OL]. 2009- 07- 13. http ://www. symantec, com/con- neet/blogs/eould sexy space be birth sins botnet.
  • 7Porras P, Saidi H, Yegneswaran V. An analysis of the Ikee. B Iphone Botnet [ C ]//Proc of MOBISEC. Berlin: Springer, 2010 : 141-152.
  • 8RootSmart [ EB/OL]. 2012-02-03. http://www, csc. ncsu. edu/faculty/jiang,/RootSmart/.
  • 9Su Jing, Chan K K W, Miklas A G, et al. A preliminary inves- tigation of worm infections in a bluetooth environment [ C ]// Proe of ACM workshop on recurring maleode. Alexandria, VA: ACM,2006.
  • 10Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a me- dium for botnet command and control[ C]//Proc of the 7th in- ternational conference on detection of intrusions and malware, and vulnerability assessment. Berlin : Springer,2010:61-80.

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部