期刊文献+

半分布式P2P Botnet的检测方法研究

Detection methods research of half distributed P2P Botnet
下载PDF
导出
摘要 Botnet近来已经是网络安全中最为严重的威胁之一,过去出现的Botnet大多数是基于IRC机制,检测方法也大都是针对这种类型的。随着P2P技术的广泛应用,半分布式P2P Botnet已经成为一种新的网络攻击手段。由于半分布式P2P Botnet的servent bot的分布范围大、网络直径宽而冗余度小,造成的危害已越来越大,对半分布式的Botnet的检测研究具有现实意义。阐述了半分布式P2P Botnet的定义、功能结构与工作机制,重点分析了目前半分布式P2P Botnet几种流行的检测方法,并进行了对比;最后,对半分布式P2P Botnet检测方法的发展趋势进行了展望。 Recently, Botnet is already to be one of great threats in network security, which appeared in the past is mostly based on IRC mechanism, and the detecting methods are also mostly for this type. With the extensive use of P2P technology, half distributed peer-to,peer(P2P) Botnet has already become one kind of new network attacks. Due to spreading widely of servent hot and little redundanee, half distributed P2P Botnet threatens network security increasingly, so the research of the detecting methods about it has more practical significance. This paper addressed the definition, architecture, functions and mechanism of half distributed P2P Botnet, analyzed several popular detecting methods, and comparing with each other. Finally, discussed the detection method development trend of half distributed P2P Botnet.
作者 谢静 谭良
出处 《计算机应用研究》 CSCD 北大核心 2009年第10期3925-3928,共4页 Application Research of Computers
基金 四川省科技厅基金资助项目(2008JY0105-2) 四川省教育厅基金资助项目(07ZA091) 实验室专项基金资助项目(2006ZD022)
关键词 半分布P2P BOTNET 检测模型 蜜罐 流量分析 钩子 half distributed P2P Botnet detection model Honeypot traffic analysis hook
  • 相关文献

参考文献17

  • 1诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157
  • 2FREILING F, HOLZ T, WICHERSKI G. Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks,AIB-2005-07 [ R]. [ S. l. ] : CS Dept of RWTH, Aachen University, 2005 : 319 - 335. 被引量:1
  • 3谢开斌,蔡皖东,蔡俊朝.基于决策树的僵尸流量检测方法研究[J].信息安全与通信保密,2008,30(3):76-77. 被引量:6
  • 4RAMACHANDRAN A, FEAMSTER N, DAGON D. Revealing Bot- net membership using DNSBL counter-intelligence [ C ]// Proc of the 2nd USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet. Berkeley, CA : USENIX Association,2006:8. 被引量:1
  • 5COOKE E, JAHANIAN F, MCPHERSON D. The zombie roundup: understanding, detecting, and disrupting Botnets [ C ]//Proc of SRUTI: Steps to Reducing Unwanted Traffic on the Internet. Berkeley, CA : USENIX Association ,2005:6. 被引量:1
  • 6WANG Ping, SPARKS S, ZOU C C. An advanced hybrid peer-to-peer botnet[ C]// Proc of the 1st Workshop on Hot Topics in Understanding Bothers (HotBots). [ S. l.] : IEEE Computer Society,2007:2. 被引量:1
  • 7GRIZZARD J B, SHARMA V, NUNNERY C, et al. Peer-to-peer Botnets[ C]//Proc of HotBots '07 Conference. 2007. 被引量:1
  • 8NUMMIPURO A. Detecting P2P-controlled bots on the host [ EB/ OL]. (2007). http://www.tml. tkk. ft./Publieaions/C/25/papers/ Nummipuro-final. pdf. 被引量:1
  • 9周永嘉,庄洪林,张毓森.一种新型P2P Botnet的分析与检测[J].计算机安全,2008(7):16-19. 被引量:1
  • 10LV Q, CAO P, COHEN E, et al. Search and replication in unstructured peer-to-peer networks[ C ]//Proc of the 16th International Conference on Supercomputing. New York: ACM Press,2002:84-95. 被引量:1

二级参考文献12

共引文献160

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部