【24h】

Realization of comprehensive Botnet inquisitive actions

机译:全面的僵尸网络查询行动的实现

获取原文
获取原文并翻译 | 示例

摘要

Today''s attack scenery is governed by Botnets. Botnet refers to a group of bots—a sort of malware which allows an attacker to achieve complete control over the affected computer. Botnets are often run by malicious programmers with specific skills. This work is to understand the consequence of large-scale “botnet probes” through investigating the ways to analyze collections of malicious probing traffic. In such events, a whole collection of remote hosts together probes the address space monitored by a sensor in somewhat a synchronized fashion. The goal is to extend methodologies by which sites receiving such probes can understand using purely local surveillance i.e., information about the probing activity regarding scanning strategies the probing employ and whether the attack specifically targets the site, or the site just accidentally probed as part of a larger, unselective attack? Our analysis draws upon comprehensive honeynet data to discover the occurrence of diverse types of scanning, with properties such as trend, uniformity, coordination, and darknet avoidance. Cross-evaluating with data from DShield assures that this approach holds for contributing to a site''s “realization” accurately.
机译:今天的攻击形势由僵尸网络控制。僵尸网络是指一组僵尸程序-一种恶意软件,它使攻击者可以完全控制受影响的计算机。僵尸网络通常由具有特定技能的恶意程序员运行。这项工作是通过研究分析恶意探测流量集合的方法来了解大规模“僵尸网络探针”的后果。在这种情况下,整个远程主机集合一起以某种同步的方式探测由传感器监视的地址空间。目标是扩展方法,使接收此类探测器的站点可以使用纯本地监视来理解,即有关与探测所采用的扫描策略有关的探测活动的信息,以及攻击是否专门针对该站点,或只是作为站点一部分意外探测到的站点更大的非选择性攻击?我们的分析利用全面的蜜网数据来发现各种类型的扫描的发生,并具有趋势,均匀性,协调性和避免暗网等特性。与来自DShield的数据进行交叉评估可确保此方法可为准确实现站点的“实现”做出贡献。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号