期刊文献+

基于网络通信指纹的启发式木马识别系统 被引量:7

Heuristic Trojan Identification System Based on Network Communication Fingerprint
下载PDF
导出
摘要 对比传统木马检测技术的原理及特点,根据网络数据流检测木马的需求,提出一种基于网络通信特征分析的木马识别方法。引入通信指纹的概念扩展通信特征的外延,用实验方法归纳木马在连接、控制和文件传输阶段表现出的通信指纹信息,设计并实现一个启发式木马网络通信指纹识别系统。测试结果表明,该系统运行高效、检测结果准确。 This paper discusses the trojan detection technique,and a detail contrast research of related characters is given.In order to provide trojan detection based on network data flow,a trojan identification method based on network communication fingerprint is broutht forward.The concept of communication fingerprint is introduced to expand the extension of the communication features.Through the experimental method the fingerprints information of trojan for each phase such as connection,control and file transfer can be highlighted.On that basis,a heuristic identification system for trojan based on network communication fingerprint is designed and implemented.Test results indicate that the system runs efficient and the results are accurate.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第17期119-121,139,共4页 Computer Engineering
基金 四川省应用基础研究基金资助项目(07JY029-011) 四川省教育厅基金资助项目(08ZA043)
关键词 木马识别 通信指纹 启发式 深度包检测 数据流 trojan identification communication fingerprint heuristic Deep Packet Inspection(DPI) data flow
  • 相关文献

参考文献5

二级参考文献25

  • 1高泽胜,陶宏才.基于NDIS-HOOK与SPI的个人防火墙研究与设计[J].计算机应用研究,2004,21(11):279-281. 被引量:9
  • 2康治平,向宏,傅鹂.基于API HOOK技术的特洛伊木马攻防研究[J].信息安全与通信保密,2007,29(2):145-148. 被引量:4
  • 3陈京浩.进程检测模型及相关技术的研究与实现[D].重庆:重庆大学,2007.
  • 4FISKIRAN A M, LEE R B. Runtime execution monitoring (REM) to detect and prevent malicious code execution[C]//Proceedings of the IEEE International Conference on Computer Design. Washington, DC: IEEE Computer Society, 2004:452 -457.
  • 5Sen S, Spatscheck O, Wang D. Accurate, scalable in-network identification of P2P traffic using application signatures[C]//in Proceedings of the 13th International Conference on World Wide Web. New York, 2004.
  • 6Angelo Spognardi, Alessandro Lucarelli. A methodology for P2P file-sharing traffic detection[ C]//in Proceedings of the 2005 Second International Workshop on Hot Topics in Peer-to-Peer Systems (HOT-P2P05). 2005.
  • 7Karagiannis T, Broido A, Brownlee N. Is P2P dying or just hiding? [ C]// IEEE Global Telecommunications Conference Proceeding, v3, Institute of Electrical and Electronics Engineers Inc. Dallas, TX, 2004:1532 - 1538.
  • 8SEELEY D. A tour of the worm[A]. Proceedings of the Winter Usenix Conference[C]. San Diego, CA, 1989.
  • 9MOORE D, SHANNOB C, BROWN I. Code-red: a case study on the spread and victims of an Internet worm[A]. Proceedings of ACM/ USENIX Internet Measurement Workshop[C]. France, 2002.
  • 10CAIDA. Dynamic graphs of the Nimda worm[EB/OL], http://www. caida.org/dynamic/analysis/security/nimda/.2001.

共引文献28

同被引文献73

引证文献7

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部