期刊文献+

基于计算机网络对抗的Agobot实例分析 被引量:2

Instance Analysis of Agobot based on Computer Network Operations
原文传递
导出
摘要 本文通过对僵尸系统的Agobot实例进行逆向分析,首次提出僵尸系统具有计算机网络对抗理论的特征,将僵尸系统与计算机网络对抗理论相结合,有助于理论转化为实践,同时也明确了僵尸系统各个要素和要素之间关系以及系统的演化方向。 First proposed that Botnet has characteristics of computer network operations theory based on the reverse analysis of Agobot instance.Combining computer network operations with Botnet can help theory into practice,clarified the relationship between the various elements and elements as well as the direction of the evolution of the Botnet system.
出处 《网络安全技术与应用》 2013年第7期86-88,共3页 Network Security Technology & Application
基金 国家"973"重点资助项目(2002CB312105) 国家信息关防与网络安全保障可持续发展计划(2002-研2-A-007)
关键词 僵尸系统 Agobot 计算机网络对抗 实例 分析 Botnet Agobot computer network operations instance analysis
  • 相关文献

参考文献8

  • 1P. Wolfowitz. DoD directive 3600.1: information operations Rev.1. Department of Defense, New York. [EB/OL].[2013-04-08]. http://www.iwar.org.uk/iwar/resources/doctrine/DOD36001.PD F.
  • 2Joint Chiefs of Staff. Joint publication 3-13: joint doctrine for information operations[M]. Washington DC:Joint Publication,1998.10.
  • 3Joint Chiefs of Staff. joint publication 1-02: department of defense dictionary of military and associated terms[M]. Washington DC: Joint Publication, 1998.10.
  • 4H. H. Shelton. Joint publication 2-0: doctrine for intelligence support to joint operations[M].Washington DC:Joint Publication,2000.5.
  • 5Joint Chiefs of Staff. Joint publication 2-01: joint and national intelligence support to military operations[M]. Washington DC:Joint Publication,2004.10.
  • 6Joint Chiefs of Staff. Joint publication 6-02: department of defense dictionary of military and associated terms[M]. Washin:on DC: Joint Publication, March 2006.
  • 7李肖坚.计算机网络自组织协同对抗研究[D].北京:北京航空航天大学,2007.
  • 8周佳骏,汪婷婷,韦刚,李肖坚.基于计算机网络对抗的僵尸网络研究与进展[J].计算机应用研究,2009,26(5):1621-1624. 被引量:2

二级参考文献14

  • 1McCARTY B. Botnets: big and bigger[ J]. IEEE Security & Privacy,2003,1 (4) :87-90.
  • 2GRIZZARD J B, SHARMA V, NUNNERY C. Peer-to-peer Botnets: overview and case study[ C ]//Proc of the 1 st Workshop on Hot Topics in Understanding Botnets. 2007.
  • 3LURHQ Threat Intelligence Group. Sinit P2P trojan analysis [ EB/ OL]. http ://www. lurhq, com/sinit, html.
  • 4LURHQ Threat Intelligence Group. Phabot trojan analysis[ EB/OL]. http ://www. lurhq, com/phatbot, html.
  • 5DoD Directive 0-8530.1, Computer network defense[ S]. 2001.
  • 6COOKE E, JAHANIAN F, McPHERSON D. The zombie roundup: understanding, detecting, and disrupting Botnets[ C]//Proc of USENIX Workshop on Steps to Reducinng Unwanted Traffic on the Internet. 2005:39-44.
  • 7McLAUGHLIN L. Bot software spreads, cause new worries [ J ]. IEEE Computer Society,2004,5(6) :1.
  • 8KRISTOFF J. Botnets[ C ]//Proc of the 32nd Meeting of the North American. [ S. l. ] : Network Operators Group, 2004.
  • 9PURl R. Bots & Botnet: an overview[ R]. [ S.l. ] : SANS Institute, 2003.
  • 10PROJECT H. Know your enemy, tracking Botnets-bot-commands [EB/OL]. (2005-02-17 ). http://www. honeynet. org/papers/ bots/botnet-commands. html.

共引文献1

同被引文献4

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部