:::

詳目顯示

回上一頁
題名:使用資料探勘技術偵測P2P殭屍網路之方法
書刊名:前瞻科技與管理
作者:廖文華陳志誠 引用關係張家慶
作者(外文):Liao, Wen-hwaChen, Patrick S.Chang, Chia-ching
出版日期:2010
卷期:特刊
頁次:頁121-135
主題關鍵詞:資料探勘殭屍網路P2PData miningBotnetP2P communication
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:43
殭屍網路是一群受到殭屍病毒感染的電腦,這些電腦是目前網際網路安全的重大威脅。攻擊者先在正常使用者的電腦中植入殭屍病毒,再經由網路下達命令操控所有的受害電腦,執行分散式阻斷服務攻擊、偷竊私密資訊或散佈垃圾郵件等進行各種的惡意行為。殭屍網路其中類型之一:P2P殭屍網路,其架構模仿P2P軟體,使用多主控端架構避免單點故障問題,並搭配加密技術,讓各種特徵比對偵測技術無法發揮其效果。但是P2P殭屍網路的運作有別於一般正常網路行為,它具有建立大量連線卻不會消耗大量頻寬的特性,故仍可用異常行為偵測技術來偵測它的存在。本論文提出一個使用資料探勘的技術的方法論來偵測P2P殭屍網路,實作於一個網路環境,並驗證其可用來尋找出P2P殭屍網路的宿主。其關鍵作法在於使用P2P殭屍網路與正常網路行為的原生相異點作為資料探勘參數,不受限於P2P殭屍網路的加密特性,透過資料探勘技術加以分群,以利分辨,並可達到可接受的正確率,從而找出潛伏於網路中的殭屍電腦。
Botnet is a collection of software agents, or robots, that run autonomously and automatically. Unfortunately it is often associated with malicious software and becoming one of the main threats of information security. The attacker usually installs via drive-by-downloads exploiting web browser vulnerabilities, worms, Trojan horses, or backdoors, under a common command-and-control infrastructure. One of the botnet types, the P2P botnet, imitates the behavior of P2P software. It makes use of multiple controller to avoid single point failure. In addition, the command it delivers is encrypted to evade signature detection. Though the operation of P2P botnet is different from common network behavior, it is characterized by massive connecting without bringing up heavy traffic flow. Consequently, this can be identified by anomaly detection. We are able to apply to clustering technique of data mining to detect the existence of a botnet and find its host. The main idea is to differentiate the botnet behavior from usual network behaviors. We achieve satisfactory precision without decrypting botnet message circulating in the network. The result of the experiment shows the applicability of the proposed method.
期刊論文
1.Yeh, S. C.、Su, M. Y.、Chang, H. C.、Chen, H. J.(2007)。An Integrated SVM and Naïve Bayes Algorithm for Anti-Spam Research。Journal of Informatics & Electronics,2(1),1-7。  new window
會議論文
1.Al-Hammadi, Y.、Aickelin, U.、Greensmith, J.(2008)。DCA for Bot Detection。The IEEE World Congress on Computational Intelligence。Hong Kong, China:IEEE Congress。1807-1816。  new window
2.Bailey, M.、Cooke, E.、Jahanian, F.、Xu, Y.、Karir, M.(2009)。A Survey of Botnet Te chnology and Defenses。Cybersecurity Applications & Technology Conference for Homeland Security。Washington, DC, US.。  new window
3.Binkley, J. R.、Singh, S.(2006)。An Algorithm for Anomaly-based Botnet Detection。USENIX 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet。San Jose, CA。  new window
4.Grabowski D(2008)。Global Network Pandemic - The Silent Threat。the Global Telecommunications Conference。New Orleans, LO, US。  new window
5.Grizzard, J. B.、Sharma, V.、Nunnery, C.、Kang, B. B. H.、Dagon, D.(2007)。Peer-to-Peer Botnets: Overview and Case Study。The 1st Workshop on Hot Topics in Understanding Botnets。Cambridge, MA:USENIX Association。  new window
6.Langin, C.、Zhou, H.、Rahimi, S.、Gupta, B.、Zargham, M.、Sayeh, M. R.(2009)。A Self- Organizing Map and Its Modeling for Discovering Malignant Network Traffic。at the Symposium of IEEE Computational Intelligence in Cyber Security。Carbondale, IL, US。  new window
7.Masud, M. M.、Al-khateeb, T.、Khan, L.、Thuraiingham, B.、Hamlen, K. W.(2008)。Flow-based Identification of Botnet Traffic by Mining Multiple Log Files。International Conference on Distributed Framework and Applications Pengang。Malaysia。  new window
8.Strayer, W. T.、Walsh, R.、Livadas, C.、Lapsley, D.(2006)。Detecting Botnets with Tight Command and Control。31st IEEE Conference on Local Computer Networks,(會議日期: November 14-16, 2006)。Tampa, FL, US。  new window
9.Livadas, C.、Walsh, B.、Lapsley, D.、Strayer, W. T.(2006)。Using Machine Learning Techniques to Identify Botnet Traffic。31st IEEE Conference on Local Computer Networks。  new window
研究報告
1.Dittrich, D.、Dietrich, S.(2008)。Discovery Techniques for P2P Botnets。  new window
2.Kumar, Sand、Spafford, E.(1994)。An Application of Pattern Matching in Intrusion Detection。  new window
圖書
1.Han, Jiawei、Kamber, Micheline(2000)。Data mining: Concepts and techniques。Morgan Kaufmann Publishers。  new window
其他
1.(20100519)。Bayes’ Theorem,http://en.wikipedia.org/wiki/Bayes%27_ theorem, 20100701。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top