期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
蜜罐先知型半分布式P2P Botnet的构建及检测方法
1
作者 谢静 谭良 周明天 《计算机工程与应用》 CSCD 北大核心 2011年第7期89-92,共4页
蜜罐技术在僵尸网络(botnet)的防御和检测中扮演着重要的角色。攻击者可能会利用已有的基于蜜罐防御技术的漏洞,即防御者配置蜜罐要担当一定的责任,不允许蜜罐参与真实的攻击,进而构建出可以躲避蜜罐的botnet。针对这一问题,提出了攻击... 蜜罐技术在僵尸网络(botnet)的防御和检测中扮演着重要的角色。攻击者可能会利用已有的基于蜜罐防御技术的漏洞,即防御者配置蜜罐要担当一定的责任,不允许蜜罐参与真实的攻击,进而构建出可以躲避蜜罐的botnet。针对这一问题,提出了攻击者利用认证sensor组建的蜜罐先知型半分布式P2P botnet,针对此类botnet,提出了用高交互性蜜罐和低交互性蜜罐相结合的双重蜜罐检测技术,并与传统蜜罐技术做了比较。理论分析表明,该检测方法能够有效地弥补蜜罐防御技术的漏洞,提高了蜜罐先知型半分布式P2P botnet的检出率。 展开更多
关键词 半分布式p2p botnet 蜜罐先知 双重蜜罐 检测模型
下载PDF
半分布式P2P Botnet的检测方法研究
2
作者 谢静 谭良 《计算机应用研究》 CSCD 北大核心 2009年第10期3925-3928,共4页
Botnet近来已经是网络安全中最为严重的威胁之一,过去出现的Botnet大多数是基于IRC机制,检测方法也大都是针对这种类型的。随着P2P技术的广泛应用,半分布式P2P Botnet已经成为一种新的网络攻击手段。由于半分布式P2P Botnet的servent bo... Botnet近来已经是网络安全中最为严重的威胁之一,过去出现的Botnet大多数是基于IRC机制,检测方法也大都是针对这种类型的。随着P2P技术的广泛应用,半分布式P2P Botnet已经成为一种新的网络攻击手段。由于半分布式P2P Botnet的servent bot的分布范围大、网络直径宽而冗余度小,造成的危害已越来越大,对半分布式的Botnet的检测研究具有现实意义。阐述了半分布式P2P Botnet的定义、功能结构与工作机制,重点分析了目前半分布式P2P Botnet几种流行的检测方法,并进行了对比;最后,对半分布式P2P Botnet检测方法的发展趋势进行了展望。 展开更多
关键词 半分布p2p botnet 检测模型 蜜罐 流量分析 钩子
下载PDF
Monitoring Peer-to-Peer Botnets:Requirements,Challenges,and Future Works
3
作者 Arkan Hammoodi Hasan Kabla Mohammed Anbar +2 位作者 Selvakumar Manickam Alwan Ahmed Abdulrahman Alwan Shankar Karuppayah 《Computers, Materials & Continua》 SCIE EI 2023年第5期3375-3398,共24页
The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as P... The cyber-criminal compromises end-hosts(bots)to configure a network of bots(botnet).The cyber-criminals are also looking for an evolved architecture that makes their techniques more resilient and stealthier such as Peer-to-Peer(P2P)networks.The P2P botnets leverage the privileges of the decentralized nature of P2P networks.Consequently,the P2P botnets exploit the resilience of this architecture to be arduous against take-down procedures.Some P2P botnets are smarter to be stealthy in their Commandand-Control mechanisms(C2)and elude the standard discovery mechanisms.Therefore,the other side of this cyberwar is the monitor.The P2P botnet monitoring is an exacting mission because the monitoring must care about many aspects simultaneously.Some aspects pertain to the existing monitoring approaches,some pertain to the nature of P2P networks,and some to counter the botnets,i.e.,the anti-monitoring mechanisms.All these challenges should be considered in P2P botnet monitoring.To begin with,this paper provides an anatomy of P2P botnets.Thereafter,this paper exhaustively reviews the existing monitoring approaches of P2P botnets and thoroughly discusses each to reveal its advantages and disadvantages.In addition,this paper groups the monitoring approaches into three groups:passive,active,and hybrid monitoring approaches.Furthermore,this paper also discusses the functional and non-functional requirements of advanced monitoring.In conclusion,this paper ends by epitomizing the challenges of various aspects and gives future avenues for better monitoring of P2P botnets. 展开更多
关键词 p2p networks botnet p2p botnet botnet monitoring HONEYpOT crawlers
下载PDF
一种新型P2P Botnet的分析与检测 被引量:1
4
作者 周永嘉 庄洪林 张毓森 《计算机安全》 2008年第7期16-19,共4页
Botnet是一种新型网络攻击方式,它为攻击者提供了灵活高效的命令与控制机制,对Internet安全造成了巨大的威胁。该文概要介绍了Botnet技术,分析了基于P2P技术的Botnet的特点,并对一种新型P2P Botnet进行了深入的分析和研究,提出了对新型P... Botnet是一种新型网络攻击方式,它为攻击者提供了灵活高效的命令与控制机制,对Internet安全造成了巨大的威胁。该文概要介绍了Botnet技术,分析了基于P2P技术的Botnet的特点,并对一种新型P2P Botnet进行了深入的分析和研究,提出了对新型P2P Botnet的检测方法。 展开更多
关键词 botnet BOT p2p 命令与控制 检测
下载PDF
一种高鲁棒性的新型P2P僵尸网络 被引量:3
5
作者 谢静 谭良 《计算机工程》 CAS CSCD 北大核心 2011年第7期154-156,共3页
提出一种利用认证sensor组建的蜜罐先知型半分布式P2P僵尸网络(Botnet),通过连接比C(p)和度数比D(p)2个度量函数,并在peer-list更新过程中使用不同数量servent bots,讨论其鲁棒性的变化。结果表明,与传统Botnet相比,该类Botnet具有较高... 提出一种利用认证sensor组建的蜜罐先知型半分布式P2P僵尸网络(Botnet),通过连接比C(p)和度数比D(p)2个度量函数,并在peer-list更新过程中使用不同数量servent bots,讨论其鲁棒性的变化。结果表明,与传统Botnet相比,该类Botnet具有较高的鲁棒性。 展开更多
关键词 僵尸网络 鲁棒性分析 半分布式p2p botnet 反检测
下载PDF
Botnet技术现状及发展趋势探讨 被引量:1
6
作者 傅务谨 《襄樊学院学报》 2009年第8期42-45,共4页
Botnet(僵尸网络)是对互联网安全最严重的威胁之一.分析了目前Botnet的结构及其技术现状,阐述了Botnet分类、检测方法,最后对Botnet的发展趋势进行了概述并提出相应的应对策略.
关键词 botnet 网络安全 p2p
下载PDF
Detecting P2P bots by mining the regional periodicity 被引量:3
7
作者 Yong QIAO Yue-xiang YANG +2 位作者 Jie HE Chuan TANG Ying-zhi ZENG 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2013年第9期682-700,共19页
Peer-to-peer (P2P) botnets outperform the traditional Internet relay chat (IRC) botnets in evading detection and they have become a prevailing type of threat to the Internet nowadays.Current methods for detecting P2P ... Peer-to-peer (P2P) botnets outperform the traditional Internet relay chat (IRC) botnets in evading detection and they have become a prevailing type of threat to the Internet nowadays.Current methods for detecting P2P botnets,such as similarity analysis of network behavior and machine-learning based classification,cannot handle the challenges brought about by different network scenarios and botnet variants.We noticed that one important but neglected characteristic of P2P bots is that they periodically send requests to update their peer lists or receive commands from botmasters in the command-and-control (C&C) phase.In this paper,we propose a novel detection model named detection by mining regional periodicity (DMRP),including capturing the event time series,mining the hidden periodicity of host behaviors,and evaluating the mined periodic patterns to identify P2P bot traffic.As our detection model is built based on the basic properties of P2P protocols,it is difficult for P2P bots to avoid being detected as long as P2P protocols are employed in their C&C.For hidden periodicity mining,we introduce the so-called regional periodic pattern mining in a time series and present our algorithms to solve the mining problem.The experimental evaluation on public datasets demonstrates that the algorithms are promising for efficient P2P bot detection in the C&C phase. 展开更多
关键词 p2p botnet detection Regional periodicity ApRIORI Autocorrelation function Evaluation function
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部