期刊文献+

强抗毁性社交僵尸网络的构建及其防御 被引量:3

Modeling and countermeasures of a social network-based botnet with strong destroy-resistance
下载PDF
导出
摘要 为打击僵尸网络,保障网络空间安全,提出一种新型的具备强抗毁性的社交僵尸网络(DR-SNbot),并给出了针对性的防御方法。DR-SNbot基于社交网络搭建命令与控制服务器(C&C-Server,command and control server),每个C&C-Server对应一个不同的伪随机昵称,并利用信息隐藏技术将命令隐藏在日志中发布,进而提出一种新型的命令与控制信道。当C&C-Server不同比例地失效时,DR-SNbot会发出不同等级的预警,通知攻击者构建新的C&C-Server,并自动修复C&C通信以保障其强抗毁性。在实验环境中,即使当前C&C-Server全部失效,DR-SNbot仍能在短期内修复C&C通信,将控制率维持在100%。最后,基于伪随机僵尸昵称与合法昵称在词法特征上的差异性,提出一种僵尸昵称检测方法,可有效检测社交僵尸网络利用自定义算法批量生成的伪随机僵尸昵称。实验结果表明,该方法召回率达到93%,准确率达到96.88%。 To defeat botnets and ensure cyberspace security, a novel social network-based botnet with strong de- stroy-resistance (DR-SNbot), as well as its corresponding countermeasure, was proposed. DR-SNbot constructed command and control servers (C&C-Servers) based on social network. Each C&C-Server corresponded to a unique pseudo-random nickname. The botmaster issues commanded by hiding them in diaries using information hiding techniques, and then a novel C&C channel was established. When different proportions of C&C-Servers were invalid, DR-SNbot would send out different levels of alarms to inform attackers to construct new C&C-Servers. Then, DR-SNbot could automatically repair C&C com- munication to ensure its strong destroy-resistance. Under the experimental settings, DR-SNbot could resume the C&C com- munication in a short period of time to keep 100% of the control rate even if all the current C&C-Servers were invalid. Fi- nally, a botnet nickname detecting method was proposed based on the difference of lexical features of legal nicknames and pseudo-random nicknames. Experimental results show that the proposed method can effectively (precision: 96.88%, recall: 93%) detect pseudo-random nicknames generated by social network-based botnets with customized algorithms.
出处 《通信学报》 EI CSCD 北大核心 2017年第1期97-105,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61572496) 国家高技术研究发展计划("863"计划)基金资助项目(No.2013AA014703 No.2012AA012801)~~
关键词 网络安全 社交网络 僵尸网络 命令与控制信道 防御策略 network security, social networks, bomet, command and control channel, countermeasure
  • 相关文献

参考文献2

二级参考文献25

  • 1McPherson D, Dobbins R, Hollyman M, ct al. Worldwide infrastructure security report, Vol 5 [R/OL]. Chelmsford, MA: Arbor Networks, 2010. [2011-01-14]. http://www. arbornetworks, corn/report.
  • 2Vogt R, Aycock J, Jacobson M. Army of botnets [C]//Proc of the 2007 Network and Distributed System Security Symposium (NDSS'07). Reston, VA: ISOC, 2007.
  • 3Starnberger G, Kruegel C, Kirda E. Ovcrbot A botnet protocol based on Kademlia [C]//Proc of the 4th Int Conf on Security and Privacy in Communication Networks. New York: ACM, 2008: 1-9.
  • 4Wang P, Sparks S, Zou C C. An advanced hybrid pee:to peer botnet [C]//Proe of the 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07). Berkeley, CAz USENIX, 2007: No 2.
  • 5Wang W, Fang B, Cui X, et al. A UserID-centralized recoverable botnet:Structure research and defense [J]. International Journal of Innovative Computing, Information and Control, 2010, 6(4):4307-4317.
  • 6Traynor P, Lin M, Ongtang M, et al. On cellular botnets: Measuring the impact of malicious devices on a cellular network core [C] //Proc of the 16th ACM Conf on Computer and Communications Security (CCS'09). New York: ACM, 2009:61-80.
  • 7Singh K, Sangal S, Jain N, et al. Evaluating bluetooth as a medium for hornet command and control [C]//Proc of the Int Conf on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA'10). Washington, DC: IEEE Computer Society, 2010: 61-80.
  • 8Wang P, Wu L, Cunningham R, et al. Honeypot detection in advanced botnet attacks [J]. International Journal of Information and Computer Security, 2010, 4(1): 30-51.
  • 9Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 10naoumov N, Ross K. Exploiting P2P systems for DDoS attacks [C]//Proc of thc 1 st Int Conf on Scalable Information Systems. New York: ACM, 2006: No 47.

共引文献11

同被引文献29

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部