期刊文献+

大规模网络流量下的恶意地址检测技术研究 被引量:1

Research on Malicious Address Detection Technology in Large Scale Network Traffic
下载PDF
导出
摘要 针对网络流量增长迅速,传统的检测方法很难解决恶意地址检测的问题,在介绍传统的恶意地址检测方法以及这些方法遇到的问题的基础上,提出了一种新的恶意地址检测思路,依靠恶意地址本身的语义特性和词汇特性建立地址分类模型,并给出模型的实现方法。通过实验测试4 389 763个地址,检测出地址3 292 322个,恶意地址834个,漏报率25%,检测时间3.21 min。由于不需要加载外部资源,处理速度相对传统检测方法有质的提高,能够适应大规模网络流量下的恶意地址检测。 In view of the rapid growth of network traffic, the traditional detection method is difficult to solve the problem of malicious address detection. On the basis of introducing the traditional method of detecting malicious address and the problems encountered in these methods, proposed a new idea of malicious address detection, that build a address classification model based on semantic features and lexical features of the malicious address, and given the realization method of the model. Tested 4 389 763 addresses by experiment, detected address 3 292 322, malicious address 834, the false negative rate of 25~, detection time 3.21 rain. Because it does not need to load external resources, the processing speed is improved by the traditional method. Can Be able to adapt to the large scale network traffic under the malicious address detection.
出处 《吉林电力》 2016年第4期1-4,共4页 Jilin Electric Power
关键词 网页地址(URL) 网络流量 恶意地址检测 检测模型 URL network traffic malicious address detection detection model
  • 相关文献

参考文献3

二级参考文献40

  • 1Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15.
  • 2PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15.
  • 3Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561.
  • 4Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656.
  • 5Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84.
  • 6D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8.
  • 7Tyler Moore, Richard Clayton. The Impact of Incentives on Notice and Take-down[C]. In Proc. of the 7th Workshop on the Economics of Information Security, New Hampshire USA, June 25-28 2007: 1-24.
  • 8Christian Ludl, Sean McAUister, Engin Kirda,et al.. On the Effectiveness of Techniques to Detect Phishing Sites[C]. In Proc. of the 4th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Lucerne Switzerland, July 12-13 2007:20-39.
  • 9Steve Sheng, Brad Wardman, Gary Warner, et al.. An Empirical Analysis of Phishing Blacklists[C]. In Proc. of the sixth Conference on Email and Anti-Spare, California USA, July 16-17 2009.
  • 10Pawan Prakash, Manish Kumar, Ramana Rao Kompella, et al.. PhishNet: Predictive Blacklisting to Detect Phishing Attacks[C]. In Proc. of the IEEE INFOCOM, San Diego Canada, March 14-19 201011-5.

共引文献74

同被引文献7

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部