期刊文献+

隐马尔可夫模型在P2P僵尸网络检测中的应用 被引量:1

Application of Hidden Markov Model in P2P Botnet Detection
下载PDF
导出
摘要 针对P2P僵尸网络的特点,将隐马尔可夫模型应用于P2P僵尸网络检测技术中.首先根据当前僵尸网络的发展状况及存在的问题分析了P2P僵尸网络的生命周期和行为特征;然后对僵尸主机的状态划分采用隐马尔可夫模型对P2P僵尸网络进行数学建模,并提出一种P2P僵尸网络的检测方法.通过实验,验证了检测方法的可靠性和合理性. In accordance with the feature of P2P botnet, the Hidden Markov Model has application in P2P botnet detection. Firstly, according to the situation and problems of the botnet recently, the life cycle and behavior characteristics of the P2P botnet have been analyzed. After that a mathematical model has been built to describe the P2P botnet with the Hidden Markov Model in state division of the bot. Meanwhile, a method of P2P bother detection has been proposed. Finally, we analyzed and summarized the experimental results, and verified the reliability and rationality of the detection method.
作者 万巍 李俊
出处 《微电子学与计算机》 CSCD 北大核心 2012年第10期14-17,共4页 Microelectronics & Computer
基金 中国科学院计算机网络信息中心青年基金项目(CNIC_QN_11003)
关键词 僵尸网络 隐马尔可夫模型 状态划分 botnet Hidden Markov Model state division
  • 相关文献

参考文献7

二级参考文献38

  • 1张相锋,孙玉芳,赵庆松.基于系统调用子集的入侵检测[J].电子学报,2004,32(8):1338-1341. 被引量:10
  • 2文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. 被引量:187
  • 3孙彦东,李东.僵尸网络综述[J].计算机应用,2006,26(7):1628-1630. 被引量:29
  • 4李杰君,郭芳.基于网络流量分析的入侵检测技术的研究[J].电脑知识与技术,2007(3):1229-1230. 被引量:2
  • 5JAKOBSSON M, RAMZAN Z. Cfimeware: Understanding new attacks and defenses[ M]. New York: Addison Wesley, 2008. 被引量:1
  • 6Enterprise firewall [EB/OL]. [2009 - 10 - 02]. http://paloalton- etworks. com/. 被引量:1
  • 7WANG PING, WU LEI, CUMMINGHAM R, et al. Honeypot detection in advanced Botnet attacks[ J]. International Journal of Information and Computer Security, 2010,4(1) : 30 -51. 被引量:1
  • 8NUMMIPURO A. Detecting P 2 P - controlled bots on the host [EB / OL]. [2009 - 10 -05]. http://citeseerx. ist. psu. edu/viewdoc/download. 被引量:1
  • 9GU GUOFEI, PORRAS P, YEGNESWARAN Y, et al. BotHunter: Detecting malware infection through IDS-driven dialog conelation[C]// Proceedinga of 16th USENIX Security Symposium on USENIX Security Symposium. Berkeley: USENIX Association, 2007: 167-182. 被引量:1
  • 10NOH S K, OH J H, LEE J S, et al. Detecting P2P botnets using a multi-phased flow model[ C]// Proceedings of the 2009 3rd International Conference on Digital Society. Washington, DC : IEEE Computer Society, 2009:247 -253. 被引量:1

共引文献189

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部