期刊文献+

基于通信特征提取和IP聚集的僵尸网络相似性度量模型 被引量:10

Modeling Botnets' Similarity Based on Communication Feature Extraction and IP Assembly
下载PDF
导出
摘要 IRC僵尸网络(botnet)是攻击者通过IRC服务器构建命令与控制信道方式控制大量主机(bot)组成的网络.IRC僵尸网络中IRC服务器与bot连接具有很强的动态特性,为识别使用不同IRC服务器的同一僵尸网络,文中提取并比对僵尸网络的通信量特征、通信频率特征,建模估算bot重叠率,通过融合以上度量指标,提出了僵尸网络相似性度量模型.实验验证了模型的有效性,计算了其准确率,并分析了僵尸网络的迁移. IRC botnet can be regarded as a collection of compromised computers(called Zombie computers)running software under the command-and-control infrastructure constructed by the IRC servers.The connection between the botnet server and the bots are usually very dynamic.In order to describe a botnet at a finer granularity,the paper proposes a method that measures the similarity of botnets by extracting and comparing the metrics such as communication volumes,frequency,and the overlap rate of bots.A novel model for botnet similarity measuring is proposed by combining those metrics mentioned. Experiments are carried out for validation ses,the confidence of the accuracy is evaluated and shown, and the migration situation of are also discussed. purpobotnet
出处 《计算机学报》 EI CSCD 北大核心 2010年第1期45-54,共10页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA010502 2007AA01Z474 2006AA01Z451)资助~~
关键词 僵尸网络 通信 聚集 相似性度量 迁移 botnet communication assemble similarity measure migration
  • 相关文献

参考文献1

二级参考文献7

  • 1BAECHER P, HOLZ T, KOETTER M, et al. Know your enemy: tracking botnets, using honeynets to learn more about bots[EB/OL]. http://www.honeynet.org/papers/ bots/, 2005. Accessed March 2007. 被引量:1
  • 2WATSON D, HOLZ T, MUELLER S. Know your enemy: phishing[EB/OL], http://www.honeynet.org/papers/phishing/,2005. Accessed March 2007. 被引量:1
  • 3PROVOS N. A virtual honeypot framework[A]. Proceedings of 13th USENIX Security Symposium[C]. San Diego, CA, USA, 2004. 1-14. 被引量:1
  • 4BALAS E, VIECCO C. Towards a third generation data capture architecture for honeynets[A]. Proceeedings of the 6th IEEE Information Assurance Workshop[C]. West Point, NY, USA, 2005. 被引量:1
  • 5BAECHER P, KOETTER M, HOLZ T, et al. The nepenthes platform: an efficient approach to collect malware[J]. Lecture Notes in Computer Science 4219, 2006, 165-184. 被引量:1
  • 6ZIMMER D. Multipot[EB/OL]. http://labs.idefense.com/software/malcode. php, 2006. Accessed March 2007. 被引量:1
  • 7LEVINE J, GRIZZARD J, OWEN H. Application of a methodology to characterize rootkits retrieved from honeynets[A]. Proceedings of the Fifth Annual Information Assurance Workshop[C]. West Point, NY, USA, 2004. 15-21. 被引量:1

共引文献43

同被引文献88

  • 1冯宗彬,时剑,黄国庆,李斌,刘军.一种新的P2P僵尸网络综合防御系统框架[J].军事通信技术,2010(1):66-71. 被引量:1
  • 2王海龙,胡宁,龚正虎.Bot_CODA:僵尸网络协同检测体系结构[J].通信学报,2009,30(S1):15-22. 被引量:9
  • 3李江涛,姜永玲.P2P流量识别与管理技术[J].电信科学,2005,21(3):57-61. 被引量:43
  • 4孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 5聚友博客.解析:僵尸网络检测方法.http://blog.myspace.cn,e,403277986.htm.2008-12-27. 被引量:1
  • 6Barford P, Blodgett M. Toward botnet mesocosms. In: Proc. of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007). http: //portal.acm.org/citation.cfm?.id= 1323128.1323134&coll=GUIDE&dl=GUIDE&CFID= 16751383&CFTOKEN=82837820. 2007. 被引量:1
  • 7Bacher P, Holz T, Kotler M, et al. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots. 2005. 被引量:1
  • 8中国蜜网项目组门户网站.http://www.honeynet.org.cn.2004-09. 被引量:1
  • 9P Wurzinger, L Bilge, T Holz, et al. Detecting Bots with Automatically Generated Network Signatures, 2010 etdorado uni-dortmund.de.https://eldorado.tu-dortmund.de/bitstream/2003/26613 /1/02-02.pdf. 2009. 被引量:1
  • 10Strayer T, Lapsley D, Walsh R, et al. Botnet Detection Based on Network Behavior. In: Botnet Detection: Countering the Largest Security Threat. Chapter 1.1-29. 2008. 被引量:1

引证文献10

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部