期刊文献+

木马网络通信特征提取模型的设计与实现 被引量:3

Design and implementation of model for network communications signatures automatic generation of Trojan horses
在线阅读 下载PDF
导出
摘要 由于木马等窃密型恶意程序对网络安全的危害性日益增加,为了提高网络入侵检测系统对木马的检测效果,研究分析了木马的网络通信形式和特点,结合一种改进的序列联配算法,设计并实现了一个木马网络通信特征自动提取模型。该模型提高了对木马通信特征进行分析的自动化程度和准确性,实例测试表明了该模型的实用性和有效性。 Aimed at the problems that malwares like Trojan horses are performing more and more harmfully to the network security,to improve the efficiency of Trojan horse detection by NIDS,the characteristics and network communication forms of Trojan horses are analyzed.Then combined a sequence alignment algorithm,a model for signatures automatic generation of Trojan horses is designed and implemented.Finally,this model is proved to be practical and effective by the experiments.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第20期4382-4384,4446,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2008AA01Z420)
关键词 特洛伊木马 网络通信 入侵检测 序列联配 特征提取 Trojan horse network communication sequence alignment intrusion detection signature generation
  • 相关文献

参考文献9

  • 1Zander S,Armitage G,Branch P.A survey of covert channels and countermeasures in computer network protocols[J].Communications Surveys and Tutorials,IEEE,2007,9(2):44-57.
  • 2李波,谭芙蓉.一种基于TCP/IP协议报文头部的隐蔽通道技术[J].计算机应用与软件,2009,26(2):277-279. 被引量:3
  • 3许晓东,王传安,朱士瑞.基于信息熵SVM的ICMP负载隐蔽通道检测[J].计算机应用,2009,29(7):1796-1798. 被引量:4
  • 4Li Le,Chen Hongchang,Liu Lixiong.Scquence alignment algorithin in similarity measurement[C].Information Technology and Applications,2009:453-456.
  • 5James Newsomc,Brad Karp,Dawn Song.Polygraph:Automatically generating signatures for polymorphic worms[C].Oakland,California:Proceedings of the IEEE S&P,2005:226-241.
  • 6唐勇,卢锡城,王勇军.攻击特征自动提取技术综述[J].通信学报,2009,30(2):96-105. 被引量:19
  • 7Arslan A N,He D.An improved algorithm for the regular expression constrained multiple sequence alignment problem[C].BioInformatics and BioEngineering,Sixth IEEE Symposium,2006:121-126.
  • 8Li Nan,Xia Chunhe,Yang Yi,et al.An algorithm for generation of attack signatures based on sequences alignment[C].Computer Science and Software Engineering,International Conference,2008:964-969.
  • 9Beheshti M,Han J,Kowalski K,et al.Packet information collection and transformation for network intrusion detection and prevention[C].Tehran:Telecommunications,International Symposium,2008:42-48.

二级参考文献58

  • 1李红莲,王春花,袁保宗,朱占辉.针对大规模训练集的支持向量机的学习策略[J].计算机学报,2004,27(5):715-719. 被引量:53
  • 2唐勇,卢锡城,胡华平,朱培栋.基于多序列联配的攻击特征自动提取技术研究[J].计算机学报,2006,29(9):1533-1541. 被引量:25
  • 3业宁,王迪,窦立君.信息熵与支持向量的关系[J].广西师范大学学报(自然科学版),2006,24(4):127-130. 被引量:10
  • 4ASCII Codes Table[ EB/OL]. http://www. lookuptables, com
  • 5Wolf M. Covert channels in LAN protocols[ M ]. in Proceedings of the Workshop on Local Area Network Secufity,LANSEC, 1989:91 -102.
  • 6Handel T,Sandford M. Hiding data in the OSI network modelk [ R ]. First International Workshop on Information Hiding, May-June 1996.
  • 7Rowl C H. Covert channels in the TCP/IP protocol suite [J]. Tech. Rep. 5, First Monday, Peer Reviewed Journal on the Intemet, July 1997.
  • 8Katzenbeisser S, Petitcolas F. Information Hiding [ M ]. Techniques for Steganography and Digital Watermarking. Computer Securiy Series, 685 Canton Street, Norwood,MA 02062: Artech House, Inc. , 2000.
  • 9Bellovin S M. Security problems in the TCP/IP protocol suite [J]. Computer Communication Review, 1989,19:32 - 48.
  • 10KABIRI P, GHORBANI A A. Research on intrusion detection and response: a survey[J]. International Journal of Network Security. 2005, 1(2): 84-102.

共引文献23

同被引文献21

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部