期刊文献+

p2p僵尸网络及检测

About p2p Botnet and the Detection
下载PDF
导出
摘要 随着网络逐步融入人们的生活,网络安全形势变得越来越复杂,僵尸网络变得越来越危险,但人们尚未认识到僵尸网络特别是p2p僵尸网络的危害。针对上述情况,文章对僵尸网络的现状和危害进行了较为系统的分析,并提出了一种基于网络流量基本检测方法,对P2P僵尸网络未来的发展进行了预测。 With the networks gradually integrating into peoplets lives, the network security situation be comes more and more complex. Botnets are becoming more and more dangerous, but people have not been a ware of the botnet, especially P2P botnet. Considering the situation, the paper describes systematically the present situation and the harm of the botnet. The paper proposes a method based on network flow detection about P2P botnet, and forecasts the trend of the P2P botnet in the future.
作者 孙玉
出处 《安徽职业技术学院学报》 2013年第2期4-6,共3页 Journal of Anhui Vocational & Technical College
基金 安徽省高校省级自然科学研究项目(KJ2012Z209)
关键词 僵尸网络 P2P僵尸网络 流量检测 网络威胁 botnet P2P botnet flow detection threat from network
  • 相关文献

参考文献7

二级参考文献35

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3李杰君,郭芳.基于网络流量分析的入侵检测技术的研究[J].电脑知识与技术,2007(3):1229-1230. 被引量:2
  • 4JAKOBSSON M, RAMZAN Z. Cfimeware: Understanding new attacks and defenses[ M]. New York: Addison Wesley, 2008.
  • 5Enterprise firewall [EB/OL]. [2009 - 10 - 02]. http://paloalton- etworks. com/.
  • 6WANG PING, WU LEI, CUMMINGHAM R, et al. Honeypot detection in advanced Botnet attacks[ J]. International Journal of Information and Computer Security, 2010,4(1) : 30 -51.
  • 7NUMMIPURO A. Detecting P 2 P - controlled bots on the host [EB / OL]. [2009 - 10 -05]. http://citeseerx. ist. psu. edu/viewdoc/download.
  • 8GU GUOFEI, PORRAS P, YEGNESWARAN Y, et al. BotHunter: Detecting malware infection through IDS-driven dialog conelation[C]// Proceedinga of 16th USENIX Security Symposium on USENIX Security Symposium. Berkeley: USENIX Association, 2007: 167-182.
  • 9NOH S K, OH J H, LEE J S, et al. Detecting P2P botnets using a multi-phased flow model[ C]// Proceedings of the 2009 3rd International Conference on Digital Society. Washington, DC : IEEE Computer Society, 2009:247 -253.
  • 10ILIOFOTOU M, PAPPU P, FALOUTSOS M, et al. Network monitoring using traffic dispersion graphs (TDGs) [C]// Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2007:315 - 320.

共引文献208

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部