期刊文献+

基于指数熵的蠕虫病毒检测方法 被引量:2

Worm detection based on exponent entropy
下载PDF
导出
摘要 在传统的入侵检测理论的基础上,研究了统计学概念模型系统熵,并结合蠕虫病毒的行为特征提出了指数熵概念,从异常检测的角度对蠕虫病毒采取了一种新型扼制方法。该方法的具体实施是建立完整的指数熵理论,推导出实用的熵值计算公式,结合局域网蠕虫病毒入侵检测技术,开发了高效的蠕虫病毒检测应用程序。实验结果表明,该方法可以检测到网络蠕虫,且具有较高的效率和较低的漏报率。 Based on the traditional theory of IDS, the system entropy is studied, which come from statistics model, combining the worm behaviors characteristic the exponent entropy conception is put forward, a new inhibiting method is proposed from the anomaly detection point of view. The concrete implementation of this method is build the integrity exponent entropy theory, deduced practical entropy value calculate formula, combined LAN worm IDS technology and developed worm detection applied program. The output of the program shows this method is feasible and has high efficiency.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第24期6278-6280,共3页 Computer Engineering and Design
基金 陕西省教育厅基金项目(06JK231)
关键词 指数熵 蠕虫病毒 入侵检测 网络安全 检测算法 exponent entropy worm intrusion detection web security detection algorithm
  • 相关文献

参考文献7

二级参考文献30

  • 1The Analysis of LSD′s Buffer Overrun in Windows RPC Interface 被引量:1
  • 2Last Stage of De rum, http∥sd-p net/spec a htm. 被引量:1
  • 3.[EB/OL].http:∥www.ngssoftware.com/vna/ms-sql.txt.,. 被引量:1
  • 4J Shoch, J Hupp. The " Worm" Programs-early Experiments with a Distributed Computation [ J ]. Communications of the ACM, 1982,22(3) :172-180. 被引量:1
  • 5D Seeley. A Tour of the Worm [ C ]. CA : Proceedings of the Winter Usenix Conference ,1989. 287. 被引量:1
  • 6D Moore,V Paxson,S Savage, et al. Inside the Slammer Worm[J].IEEE Magazine on Security and Privacy,2003,1 (4) :33-39. 被引量:1
  • 7D Moore, V Paxson, C Shannon, et al. The Spread of the Sapphire/Slammer Worm [ R ]. Proceedings of the CAIDA Technical Report,2003.1-9. 被引量:1
  • 8N Weaver, V Paxson, S Staniford,et al. A Taxonomy of Computer Worms [ C ]. Proc. ACM CCS Workshop on Rapid Malcode, 2003.http ://www. silicondefense, com/research/. 被引量:1
  • 9Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense[ C]. ACM Conference on Computer and Communications Security, 2003. 51-60. 被引量:1
  • 10Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis [ C ]. ACM Conference on Computer and Communications Security, 2002. 138-147. 被引量:1

共引文献47

同被引文献15

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部