期刊文献+

利用多维观测序列的KCFM混合模型检测新型P2P botnet 被引量:3

Application KCFM to Detect New P2P Botnet Based on Multi-Observed Sequence
原文传递
导出
摘要 提出了一种新颖的综合考虑多维观测序列的实时检测模型——KCFM。通过抽取新型分散式P2Pbotnet的多个特征构成多维观测序列,使用离散Kalman滤波算法发现流量异常变化,将Multi-chart CUSUM作为差异放大器提高检测精度。实验表明,基于多维观测序列的KCFM模型能够有效地检测新型P2Pbotnet。 We propose a novel real-time detecting model-KCFM(Kalman filter and multi-chart CUSUM fused model) based on multi-observed sequence,which consists of several extracted the new P2P botnet characteristic properties.The KCFM finds the abnormal traffic by the discrete Kalman filter,and improves the detection precision by using the Multi-chart CUSUM as an amplifier.The experiments show that our approach can detect new decentralized botnet with a relatively high precision.
作者 康健 宋元章
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期520-523,共4页 Geomatics and Information Science of Wuhan University
基金 国家自然科学基金重大研究计划资助项目(90204014) 国家自然科学基金资助项目(60703023) 吉林省科技发展计划资助项目(20090110)
关键词 P2Pbotnet 离散Kalman滤波 Multi-chartCUSUM P2P botnet discrete Kalman filter multi-chart CUSUM
  • 相关文献

参考文献15

  • 1Northcutt S, Skoudis E, Sachs M, et al. Top Ten Cyber Security Menaces for 2008[OL].http:// www. sans. org/ 2008 menaces, 2008.
  • 2Stewart J. Storm Worm DDOS Attack[C]. Secure- Works Inc, Atlanta ,GA, 2007.
  • 3Grizzard J B, Sharma V, Nunnery C, et al. Peer-to- peer botnets: Overview and Case Study[C].The 1st USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, USA, 2007.
  • 4Sarat S,Terzis A. Measuring the Storm Worm Network[R]. Technical Report 01-10-2007, HiNRG Johns Hopkins University, 2007.
  • 5Holz T, Steiner M, Dahl F, et al. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm[C].The 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), Usenix, San Francisco, 2008.
  • 6Steggink M, Idziejczak I. Detection of Peer-to-Peer Botnets[R]. University of Amsterdam, Netherlands, 2007.
  • 7Nunnery C,Kang B B. Locating Zombie Nodes and Botmasters in Decentralized Peer-to-Peer Botnets[OL]. http://honeynet, uncc. edu/papers/P2P DetectConeept Paper. pdf. 2007.
  • 8Davis C R, Fernandez j M, Neville S,et al. Sybil Attacks as a Mitigation Strategy Against the Storm Botnet[C]. The 3rd Int Conf on Malicious and Unwanted Software , Alexandria, VA ,2008.
  • 9Kang B, Chan-Tin E, Lee C, et al. Towards Complete Node Enumeration in a Peer-to-Peer Botnet[C]. ACM Symposium on Information, Computer & Communication Security, Sydney, Australia, 2009.
  • 10诸葛建伟,韩心慧,周勇林,叶志远,邹维.僵尸网络研究[J].软件学报,2008,19(3):702-715. 被引量:157

二级参考文献4

共引文献156

同被引文献26

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部