Please wait a minute...
Advanced Search
现代图书情报技术  2007, Vol. 2 Issue (1): 44-48     https://doi.org/10.11925/infotech.1003-3513.2007.01.11
  20届机检会论文选登 本期目录 | 过刊浏览 | 高级检索 |
网络蠕虫检测系统的设计和实现
钱旭 顾巍 陈凌晖 丁晓峰
(北京文献服务处 北京 100036)
Design and Application of Network Worm Detection System
Qian Xu   Gu Wei   Chen Linghui   Ding Xiaofeng
(Beijing Document Service,  Beijing 100036, China)
全文: PDF (706 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 

设计一种面向实际应用的网络蠕虫检测系统,并初步实现原型系统。该系统采用分布式架构,主要针对局域网内的未知蠕虫进行实时监控,通过分析网络数据流量,提取蠕虫传播过程中的普遍特征,预测未知蠕虫在网内大规模爆发的趋势。该蠕虫检测系统可作为网络安全体系的重要组成部分,保障本地网络系统的稳定、安全运行。

服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
丁晓峰
钱旭
顾巍
陈凌晖
关键词 网络蠕虫分布式架构异常检测    
Abstract

The application system for network worm detecting is designed, as well the prototype is constructed. The distributed structure is adopted to monitor the unknown worms at real-time, analyse the network stream, bring up the signature of worm spreading to identify that the unknown worms erupt in local network. The worm detection system could be applied as a significant aspect of network security architecture to secure the local network system.

Key wordsNetwork worm    Distributed structure    Anomaly detection
收稿日期: 2006-10-13      出版日期: 2007-01-25
: 

TP309.5

 
通讯作者: 钱旭     E-mail: qx@cetin.net.cn
作者简介: 钱旭,顾巍,陈凌晖,丁晓峰
引用本文:   
钱旭,顾巍,陈凌晖,丁晓峰 . 网络蠕虫检测系统的设计和实现[J]. 现代图书情报技术, 2007, 2(1): 44-48.
Qian Xu,Gu Wei,Chen Linghui,Ding Xiaofeng . Design and Application of Network Worm Detection System. New Technology of Library and Information Service, 2007, 2(1): 44-48.
链接本文:  
https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/10.11925/infotech.1003-3513.2007.01.11      或      https://manu44.magtech.com.cn/Jwk_infotech_wk3/CN/Y2007/V2/I1/44

1Steve W.Open problems in computer virus research. http://www.research.ibm.com/antivirus/SciPapers/White/Problems/ Problems.html(Accessed Sept.10,2005)
2Jose Nazario, Jeremy Anderson, Rick Wash, Chris Connelly. The Future of Internet Worms. Presented at the Blackhat Briefings, July, 2001, Las Vegas
3Cliff Changchun Zou, Weibo Gong, Don Towsley. Code Red Worm Propagation Modeling and Analysis. 9th ACM Conference on Computer and Communication Security, Nov. 18-22,2002
4Staniford S,Paxson V,Weaver N. How to Own the Internet in Your Spare Time. 11th Usenix Security Symposium, San Francisco, August 2002
5Lockwood J W, Moscola J, Kulig M. Internet worm and virus protection in dynamically reconfigurable hardware, WORM 2003

[1] 翟东升,郭程,张杰,李登杰. 采用异常检测的技术机会识别方法研究[J]. 现代图书情报技术, 2016, 32(10): 81-90.
[2] 吴红, 王凤英, 付秀颖. 面向专利分析的法律状态分布式采集系统的设计与实现[J]. 现代图书情报技术, 2012, (12): 66-71.
[3] 丁晓峰,李周贤,刘炳华,顾巍,吴楠宁 . 在SSH协议下的入侵检测[J]. 现代图书情报技术, 2006, 1(4): 60-62.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 《数据分析与知识发现》编辑部
地址:北京市海淀区中关村北四环西路33号 邮编:100190
电话/传真:(010)82626611-6626,82624938
E-mail:jishu@mail.las.ac.cn