期刊文献+

基于网络流量的僵尸网络动态检测模型 被引量:5

Dynamic Detection Model in Botnet Based on Network Traffic
下载PDF
导出
摘要 针对利用先验知识不能检测新型或变异僵尸网络(Botnet)的现状,提出一种基于网络流量的Botnet动态检测模型。通过聚类分析通信流量并完成关联分析,以鉴定bot之间的类似通信和恶意行为模式。该模型具有特征库更新和检测模型生成的动态性,并且可以处理来自不同僵尸网络的数据,其检测体系结构与协议和Botnet的先验知识无关。实验结果验证了该模型的有效性和准确性。 For the status quo that the Botnet detection of a priori knowledge to get the matching and protocol-related are unable to be suitable for new or mutated Botnet detection,this paper proposes a dynamic Botnet detection model based on network traffic. By using clustering,it analyzes traffic and completes the correlation analysis to identify similar between bot communication and malicious behavior patterns. The test architecture has nothing to do with the agreement and Botnet prior knowledge. The model has three dynamic characteristics, such as the characteristics of library updated, detection model generation,and handling the network traffic from the dynamic Botnet. Finally,the effectiveness and the accuracy are verified by the experimental data.
作者 成淑萍 谭良
出处 《计算机工程》 CAS CSCD 2014年第11期106-112,共7页 Computer Engineering
关键词 网络安全 僵尸网络 恶意代码 网络流量 动态检测 network security Botnet malicious code network flow dynamic detection
  • 相关文献

参考文献5

二级参考文献53

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 3王伟,曾国荪,刘涛.基于信任机制的协作系统形成与演化机制[J].通信学报,2006,27(11):31-35. 被引量:4
  • 4Wang P, Sparks S, Zou C C. An Advanced HybridPeer to-Peer Botnet[C].//Proc. of the 1st Workshop on HotTopics in Understanding Botnets (HotBots 2007), Boston, 2007.
  • 5RAJAB M,,ZARFOSS J,MONROSE F.A multi-faceted approach to understanding the botnet phenomenon. Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference(IMC’06) . 2006
  • 6RAMACHANDRAN A,FEAMSTER N,DAGON D.Revealing Botnet membership using DNSBL counterintelligence. Proceedings of USENIX SRUTI’06 . 2006
  • 7BARFORD P,YEGNESWARAN V.An Inside Look at Botnets. . 2007
  • 8LEE J S,JEONG H C,PARK J H.The activity analysis of malicious http-based botnets using degree of periodic repeatability. Proceed-ings of2008International Conference on Security Technology,Sec-Tech2008 . 2008
  • 9CHOI H,LEE H.Botnet detection by monitoring group activities in DNS traffic. 7th IEEE International Conference on Computer and Information Technology . 2007
  • 10MATTHEW S,IGOR I.Detection of Peer-to-Peer Botnets. . 2008

共引文献23

同被引文献38

  • 1Finding P2P Bots with Structured Graph Analysis[ C]// Proceedings of the 19th USENIX Conference on Security. New York, USA : ACM Press, 2010 : 7.
  • 2Holz T, Steiner M, Dahl F, et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm [C]/Proceedings of the I st Usenix Workshop on Large-scale Exploits and Emergent Threats. New York,USA:ACM Press,2008 : 115-124.
  • 3Wang Binbin,Li Zhitang,Tu Hao,et al. Actively Measuring Bots in Peer-to-Peer Networks[ M]. New York,USA:ACM Press ,2009.
  • 4Sarat S,Terzis A. Measuring the Storm Worm Network: 01-10-2007 [ R ]. HiNRG Johns Hopkins University,2007.
  • 5Kutzner K, Fuhrmann T. Measuring Large Overlay Networks The Overnet Example [ C ]//Proceedings of the 14th Conference on Kommunikation in Verteilten Systemen. Berlin, Germany : Springer, 2005 : 193-204.
  • 6Starnberger G, Kruegel C, Kirda E. Overbot: A Botnet Protocol Based on Kademlia[ C]//Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York, USA : ACM Press, 2008:241-242.
  • 7Wang Ping,Wu Lei,Aslam B ,et al. A Systematic Study on Peer-to-Peer Botnets [ C ]//Proceedings of the 18th International Conference on and Networks. Washington 2009 : 1-8.
  • 8Computer Communications D. C., USA: IEEE Press, Wang Ping, Aslam B, Zou C C. Peer-to-Peer Botnets: The Next Generation of Botnet Attacks [J]. Electrical Engineering, 2010,24 ( 4 ) : 1-25.
  • 9Liu Xuejiao, Xiao Debao, Ma Nian, et al. A Scalable, Vulnerability Modeling and Correlating Method for Network Security [ C]//Proceedings of the 4th Inter-national Conference on Scalable Information Systems. Washington D. C., USA: IEEE Press,2009 : 217-227.
  • 10Liu Xuejiao,Fang Chengfang, Xiao Debao, et al. A Goal- oriented Approach for Modeling and Analyzing Attack Graph [ C ]//Proceedings of International Conference on Information Science and Application. Washington D. C., USA : IEEE Press ,2010 : 1-8.

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部