期刊文献+

基于关联规则挖掘的集中式僵尸网络检测 被引量:4

Centralized botnet detection based on association-rule mining
下载PDF
导出
摘要 针对目前大部分僵尸网络检测技术只是对活动的僵尸计算机进行检测,而很少考虑潜伏的僵尸计算机检测问题,提出一种基于关联规则挖掘的集中式僵尸网络检测技术.根据集中式僵尸网络必定存在一台命令&控制服务器,且所有僵尸计算机都会连线到命令&控制服务器的特性,利用一台已被检测出的僵尸计算机,以关联规则挖掘技术分析彼此之间网络连线的关联性,扩展挖掘出网络中其他尚处于潜伏期的僵尸计算机.实验证明,本方法能够有效地检测出隐藏的僵尸计算机. Aimed at the problem that most of the botnet detection technique is used only to detect active botnet computers and the detection of hidden ones is seldom taken into account, centralized botnet detec- tion technique is proposed based on association-rule mining approach. According to the fact that a set of command-control server exist necessarily in the centralized botnet and all botnet computers will be con- nected with it, a set of detected out botnet computer will be used to analyze the associativity of their con- nections with each other by using the association-rule mining technique. Experiment proves that present method can be effectively used to detect out the hidden botnet computers.
作者 周维柏 李蓉
出处 《兰州理工大学学报》 CAS 北大核心 2016年第6期109-113,共5页 Journal of Lanzhou University of Technology
基金 2014年广东省教育教学成果奖(高等教育)培育项目(1182)
关键词 数据挖掘 关联规则 僵尸网络 网络安全 data mining association-rule mining botnet network security
  • 相关文献

参考文献5

二级参考文献142

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3Geer D.Malicious bots threaten network security[J].IEEE Computer,2005,38(1):18-20.
  • 4Rajab M,Zarfoss J,Monrose F,et al.A multi-faceted approach to understanding the botnet phenomenon[C]//Proc of the 6th ACM SIGCOMM Conf on Internet Measurement Conference(IMC'06).New York:ACM,2006:41-52.
  • 5Dean T,Marc F,Eric J,et al.Symantec global Internet security threat report:Trends for July-December 07(Volume ⅩⅢ)[R].Cupertino,CA,USA:Symantec Inc.,2008.
  • 6Marc F,Eric J,Mack T,et al.Symantec global Internet security threat report:Trends for 2008(Volume ⅩⅣ)[R].Cupertino,CA,USA:Symantec Inc,2009.
  • 7Baecher P,Koetter M,Holz T,et al.The Nepenthes platform:An efficient approach to collect malware[G]//LNCS 4219:Proc of the Int Symp on Recent Advances in Intrusion Detection(RAID'06).Berlin:Springer,2006:165-184.
  • 8Zhu Zhaosheng,Fu Zhi Judy,Lu Guohan,et al.Botnet research survey[C]//Proc of the 32nd Int Computer Software and Applications Conference.Washington,DC:IEEE Computer Society,2008:967-972.
  • 9Govil J,Govil J.Criminology of botnets and their detection and defense methods[C]//Proc of 2007 IEEE Int Conf on Electro/Information Technology(EIT2007).Washington,DC:IEEE Computer Society,2007:215-220.
  • 10Govil J.Examining the criminology of bot zoo[C]//Proc of the 6th Int Conf on Information,Communications and Signal Processing.Washington,DC:IEEE Computer Society,2007:473-478.

共引文献82

同被引文献38

引证文献4

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部