期刊文献+

僵尸网络发展研究 被引量:22

Study of Botnets Trends
下载PDF
导出
摘要 僵尸网络(botnet)作为最有效的网络攻击平台,给当今互联网安全带来了巨大威胁.虽然近几年关于僵尸网络的攻防技术研究取得了显著进展,然而,伴随着互联网应用的多元化以及通信技术的不断革新,僵尸网络的形态和命令控制机制也在不断发生变化,这给防御人员带来了新的挑战.深入了解僵尸网络运行机理和发展趋势对有效应对僵尸网络引发的安全威胁具有重要意义.以僵尸网络攻击技术为核心,从形式化定义、传播方式、生命周期、恶意行为、命令控制信道方面对僵尸网络机理进行全面介绍,按时间顺序将僵尸网络的发展历程划分为PC攻击和广泛攻击2个阶段,对各阶段的技术特点、行为特性、代表案例以及演化规律进行详细阐述,总结当今僵尸网络防御方法和研究成果,对已有研究遗留的问题和未来可能研究热点进行讨论. Botnets,as one of the most effective platforms to launch cyber-attacks,pose great threats to the security of today's cyber-space.Despite the fact that remarkable progress had been made in the researches of botnets'both attack and defense technologies in recent years,the forms and command and control mechanisms of botnets,however,as Internet applications are put into a wider variety of uses and communication technologies upgraded more rapidly than ever,are also undergoing constant changes,bringing new challenges to defenders.For this reason,an in-depth investigation of botnets'working mechanisms and development is of great significance to deal with the threats posed by botnets.This paper,with the attack technologies of botnets as its main focus,gives an comprehensive introduction of the working mechanisms of botnets in terms of its definition,transmission,lifecycle,malicious behaviors and command and control channels,and divides the botnets'development into two stages,namely,attacks to traditional PC and extensive attacks,with the technological features,behavioral characteristics,case studies and evolutionary patterns of each stage elaborated in a detailed manner.After a summary of existing work on the defense of botnets with the limitations of each approach discussed,possible future attempts are presented.
作者 李可 方滨兴 崔翔 刘奇旭 Li Ke;Fang Binxing;Cui Xiang;Liu Qixu
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第10期2189-2206,共18页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61303239) 广东省产学研合作项目“广东省健康云安全院士工作站”(2016B090921001)~~
关键词 僵尸网络 命令控制信道 网络对抗 增值网络攻击 综述 botnet command and control channel(C&C channel) countermeasure value-added network attack survey
  • 相关文献

参考文献3

二级参考文献65

  • 1文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 2孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 3Porras P, Saidi H, Yegneswaran V. A foray into Conficker's logic and rendezvous points [R/OL]. Berkeley, CA: USENIX, 2009. [2011-06-10]. http://www, usenix, org/ events/leet09/tech/full papers/porras/porras_html/.
  • 4CNCERT.中国互联网网络安全报告[EB/OL].2011.[201-06-10].http://www.cert.org.cn/UserFiles/File/2010%20first%20half.pdf.2010.
  • 5Symantec Inc. Symantec global Internet security threat report trends for 2009 volume XV [EB/OL]. 2010. E2011 06-101. http://eval, symantee, com/mktginfo/enterprise/white_ papers/b-whitepaper_internet security threat report xv 04 2010. en-us, pdf.
  • 6Holz T, Gorecki C, Rieck C, et al. Detection and mitigation of fast-flux service networks [C] //Proc of the 15th Annual Network and Distributed System Security Symposium. Berkeley, CA: USENIX, 2008.
  • 7Stone-Gross B, Cova M, Cavallaro L, et al. Your botnet is my botnet: Analysis of a botnet takeover[C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:635-647.
  • 8Cui Xiang, Fang Towards advanced Usenix Workshop Threats. Berkeley, Binxing, Yin Lihua, et al. Andbot: mobile bomets [C] //Proc of the 4th on Large-scale Exploits and Emergent CA: USENIX, 2011:No 11.
  • 9Wang P, Sparks S, Zou C C. An advanced hybrid peer-topeer botnet [C] //Proc of the 1st Conf on 1st Workshop on Hot Topics in Understanding Botnets. Berkeley, CA: USENIX, 2007: No 2.
  • 10Holz T, Steiner M, Dahl F, et al. Measurements an mitigation of peer-to peer-based botnets:A case study o storm worm [C] //Proc of the 1st USENIX Workshop o Large-scale Exploits and Emergent Threats. Berkeley, CA USENIX, 2008: No 9.

共引文献232

同被引文献145

引证文献22

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部