期刊文献+

基于Webshell的僵尸网络研究 被引量:3

Research on Webshell-based botnet
下载PDF
导出
摘要 以Web服务器为控制目标的僵尸网络逐渐兴起,传统命令控制信道模型无法准确预测该类威胁。对传统Webshell控制方式进行改进,提出一种树状拓扑结构的信道模型。该模型具备普适和隐蔽特性,实验证明其命令传递快速可靠。总结传统防御手段在对抗该模型时的局限性,分析该信道的固有脆弱性,提出可行的防御手段。 With the rapid rising of Web server-based botnets, traditional channel models were unable to predict threats from them. Based on improving traditional Webshell control method, a command and control channel model based on tree structure was proposed. The model was widely applicable and stealthy and the simulation experimental results show it can achieve rapid and reliable commands delivery. After summarizing the limitations of current defenses against the proposed model, the model's inherent vulnerabilities is analyzed and feasible defense strategies are put forward.
出处 《通信学报》 EI CSCD 北大核心 2016年第6期11-19,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61303239) 国家高技术研究发展计划("863"计划)基金资助项目(No.2012AA012902)~~
关键词 僵尸网络 命令与控制 信道预测 WEBSHELL botnet command and control channel prediction Webshell
  • 相关文献

参考文献21

  • 1CUI X, FANG B X, et al. Bother triple-channel model: towards resil- ient and efficient bidirectional communication botnets[M]//Security and Privacy in Communication Networks. Springer International Pub- lishing, 2013.
  • 2SHAHID K, et al. A taxonomy of botnet behavior, detection, and defense[J]. Communications Surveys & Tutorials, IEEE 2015, 16(2): 898-924.
  • 3HEILMAN E, KENDLER A, ZOHAR A, et al. Eclipse attacks on Bitcoin's peer-to-peer network[C]//24th USENIX Security Symposium (USENIX Security 15). c2015: 129-144.
  • 4CANALI D, BALZAROTTI D. Behind the scenes of online attacks: an analysis of exploitation behaviors on the Web[C]//20th Annual Network & Distributed System Security Symposium (NDSS 2013). c2013.
  • 5Netcraff. Web server survey[EB/OL], http://news, netcratt.com/ ar- chives/2015/11/16/november-2015-web-server-survey.html.
  • 6Symantec. 2015 Intemet security threat report [EB/OL]. https:// www.symantec.com/security_response/publications/threatreport, jsp.
  • 7F-Secure. Backdoor: Osx/tsunami[EB/OL]. https://www, f-secure. com/v-descsPoackdoor_ osx_ tsunami_a.shtml.
  • 8New bot malware (BoSSaBoTv2) attacking Web servers discov- ered[EB/OL], https://www.mmwave.com/Resources/SpiderLabs-Blog/- Honeypot-Alert-New-Bot-Malware-(BoSSaBoTv2)-Attacking-Web- Servers-Discovered/.
  • 9WANG P, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer botnet[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(2): 113-127.
  • 10STARNBERGER G, KRUEGEL C, KIRDA E. Overbot: a botnet protocol based on Kademlia[C]//The 4th International Conference on Security and Privacy in Communication Networks. ACM, c2008.

同被引文献11

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部