期刊文献+

网络蠕虫的检测和防治 被引量:1

Network worm's examination and prevention
原文传递
导出
摘要 随着网络系统应用及其复杂性的增加,网络蠕虫已成为网络安全的主要威胁之一。目前的蠕虫传播速度如此之快使得单纯依靠人工手段已无法抑制蠕虫的爆发。本文首先介绍了蠕虫的相关概念,然后详细介绍了当前蠕虫检测的关键技术,最后给出了蠕虫检测技术的总结和展望。 With the explosive growth of network applications and complexity,Internet worms become a major threat to the network security. Modern worms can spread so quickly,and so widely,that no human-mediated can hope to contain the outbreak. In this paper,first some concepts about worm are presented. Next we introduce the critical techniques of Internet worm detection. Finally the summery and trends of worm detection technique are given.
作者 杨昱
出处 《网络安全技术与应用》 2013年第12期83-84,共2页 Network Security Technology & Application
关键词 网络安全 网络蠕虫 蠕虫检测 Network security Internet worm worm detection
  • 相关文献

参考文献4

二级参考文献20

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 3Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 4Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 5Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 6Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 7Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 8NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/
  • 9Niccolini S, Molina M, Duffield N. Hash functions description for packet selection. 2003. http://www.watersprings.org/pub/id/draft-niccolini-hash-descr-00.txt
  • 10C C Zou,W Gong,D Towsley.On the Performance of Internet Worm Scanning Strategies[R].Electrical and Computer Engineering Department,University of Massachusetts,2003.

共引文献62

同被引文献10

  • 1王晓锋,方滨兴,云晓春,张宏莉.并行网络模拟中的一种拓扑划分方法[J].通信学报,2006,27(2):16-21. 被引量:14
  • 2Fujimoto R M.Parallel discrete event simulation[J].Communications of the ACM,1990,33(10):30-53.
  • 3George F Riley.Using the georgia tech network simulation[EB/OL].http;//www.ece.gatech.edu/research/labs/MANIACS/ GTNets/docs/GTN ets-manual,pdf.
  • 4Castaneda F,Sezer E C,XU J.WORM vs.WORM:preliminary study of an active counter-attack mechanism[C]//Proceedings of the 2004 ACM Workshop on Rapid Malcode.Washington! DC:Association for Computing Machinery,2004;83-93.
  • 5Tangmunarunkit H,Govindan R,Jamin S,et al.Network topology generators:degree-based vs.structural[J].Proceedings of Acm Sigcomm Computer Communication Review.Pennsylvania:[s.n.],2002,31(4):147-159.
  • 6George K,Kumar V P.METIS-a software package for partitioning unstructured graphs,partitioning meshes,and computing fill- reducing orderings of sparse matrices,version 4.0[R].Twin Cities:University of Minnesota,1998.
  • 7Dijkstra E W.A note on two problems in connexion with graphs[J].Numerische Mathematik,1959(1):269-271.
  • 8杨望.CAIDA提供互联网数据共享服务[J].中国教育网络,2008(5):27-28. 被引量:4
  • 9陈伟,孙志勇,许德武.良性蠕虫的B+地址树扩散策略[J].计算机工程,2012,38(6):135-138. 被引量:1
  • 10庄新妍,刘扬,董改芳.基于网格的蠕虫行为模拟器[J].内蒙古农业大学学报(自然科学版),2014,35(2):151-157. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部