首页> 外文会议>APAN第24届亚太高速网络会议 >An Analysis on Distribution of Malicious Packets and Threats over the Internet
【24h】

An Analysis on Distribution of Malicious Packets and Threats over the Internet

机译:互联网上恶意数据包和威胁的分布分析

获取原文

摘要

Internet worms pose great threats for computer systems connected to the Internet. Malicious packets sent by Internet worms or port-scan activities can be captured by monitoring ports of IP addresses where any network service is provided. We present an analysis of distribution of malicious packets over the Internet and show evaluation of Internet threats.Several methods have been proposed for detecting threats over the Internet based on monitoring malicious packets. Most of these methods apply statistical methods to time-series frequencies of malicious packets. We proposes a method for evaluating threats on the Internet based on graph defined by the sources and destinations of monitored malicious packets. In order to evaluate threats, we formulate two relationships between threats of the worms and vulnerability of ports of network services and apply Eigenvalue problem to derive threat levels of network ports. We applied our method to working examples monitored during the period of worm outbreaks to show the effectiveness of our method.
机译:Internet蠕虫对连接到Internet的计算机系统构成了巨大的威胁。 Internet蠕虫或端口扫描活动发送的恶意数据包可以通过监视提供任何网络服务的IP地址的端口来捕获。我们将分析Internet上恶意数据包的分布,并显示对Internet威胁的评估。 已经提出了几种基于监视恶意数据包来检测Internet上的威胁的方法。这些方法大多数都将统计方法应用于恶意数据包的时间序列频率。我们提出了一种基于受监视恶意数据包的源和目标定义的图来评估Internet上的威胁的方法。为了评估威胁,我们制定了蠕虫的威胁与网络服务端口的脆弱性之间的两种关系,并应用特征值问题来推导网络端口的威胁级别。我们将我们的方法应用于蠕虫爆发期间监控的工作示例,以证明我们方法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号