期刊文献+

跟踪僵尸网络 被引量:5

Tracking Botnets
在线阅读 下载PDF
导出
摘要 密罐是一种用来发现攻击工具、攻击策略与攻击者攻击动机的技术。在本文中,我们考虑一种特殊的安全威胁:运行僵尸网络的个人与组织。僵尸网络是一个可以由攻击者远程控制的已被攻陷主机组成的网络。由于它们数量巨大(可以把几万台主机连接在一起),因此对网络构成了极其严重的威胁。在蜜网的帮助下,我们可以观察运行僵尸网络。由于记录数据的丰富性,这使得重构攻击者的行动、使用的工具和详细地研究他们成为了可能。这里,我们对僵尸网络、普遍的攻击技术做更进一步的介绍。 Honeypots are a well known technique for discovering the tools, tactics, and motives of attackers. In this paper we look at a special kind of threat : the individuals and organizations who run botnets. A botnet is a network of compromised machines that can be remotely controlled by an attacker. Due to their immense size ( tens of thousands of systems can be linked together), they pose a severe threat to the net. With the help of honeynets we can observe the people who run botnets. Due to the wealth of data logged, it is possible to reconstruct the actions of attackers, the tools they use, and study them in detail. In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
作者 刘冬梅
机构地区 山东警察学院
出处 《信息技术与信息化》 2006年第6期47-49,共3页 Information Technology and Informatization
关键词 僵尸网络 密罐 分布式拒绝服务攻击 Botnet Honeypots Distributed denial - of- service attacks
  • 相关文献

参考文献7

  • 1J. S. Balasubramaniyan, J. O. Garcia- Fernandez, D.Isacoff, E. Spafford, and D. Zamboni. An architecture for intrusion detection using autonomous agents. Technical Report 98/05, Purdue University, 1998.
  • 2Staniford- ChenS, CheungS, CrawfordRetal, GRIDS: a graph based intrusion detection system tbr large networks.In: Proceedings of the 19th National Information Systems Security Conference, Voll. National Institute of Standards and Technology, 1996. 361-370.
  • 3HochbergJ, JacksonK, StallingsCetal. NADIR: an automated system for detecting network intrusion and misuse.Computers and Security, 1993, 12 (3) :255 - 248.
  • 4G. White, E. Fisch, and U. Pooch. Cooperating security managers: A peer- based intrusion detection system.IEEE Network, 10( 1 ) :20 - 23, 1994.
  • 5陈明奇.CNCERT/CC狙击僵尸网络[J].信息网络安全,2005(12):66-67. 被引量:2
  • 6陈明奇,崔翔.“僵尸网络”的威胁及应对策略[J].信息网络安全,2005(5):55-56. 被引量:3
  • 7杜跃进.“僵尸”施爆网络,中国计算机报,2005,32.

共引文献3

同被引文献22

引证文献5

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部