首页> 外文学位 >Behavioral modeling of botnet populations viewed through internet protocol address space.
【24h】

Behavioral modeling of botnet populations viewed through internet protocol address space.

机译:通过互联网协议地址空间查看的僵尸网络种群的行为模型。

获取原文
获取原文并翻译 | 示例

摘要

A botnet is a collection of computers infected by a shared set of malicious software, that maintain communications to a single human administrator or small organized group. Botnets are indirectly observable populations; cyber-analysts often measure a botnet's threat in terms of its size, but size is derived from a count of the observable network touchpoints through which infected machines communicate. Activity is often a count of packets or connection attempts, representing logins to command and control servers, spam messages sent, peer-to-peer communications, or other discrete network behavior. Front line analysts use sandbox testing of a botnet's malicious software to discover signatures for detecting an infected computer and shutting it down, but there is less focus on modeling the botnet population as a collection of machines obscured by the kaleidoscope view of Internet Protocol (IP) address space. This research presents a Bayesian model for generic modeling of a botnet due to its observable activity across a network. A generation-allocation model is proposed, that separates observable network activity at time t into the counts yt generated by the malicious software, and the network's allocation of these counts among available IP addresses. As a first step, the framework outlines how to develop a directly observable behavioral model informed by sandbox tests and day-to-day user activity, and then how to use this model as a basis for population estimation in settings using proxies or Network Address Translation (NAT) in which only the aggregate sum of all machine activity is observed. The model is explored via a case study using the Conficker-C botnet that emerged in March of 2009.
机译:僵尸网络是感染了一组共享恶意软件的计算机的集合,这些恶意软件维持与单个人工管理员或组织较小的团体的通信。僵尸网络是可间接观察到的人群。网络分析人员通常会根据僵尸网络的大小来衡量僵尸网络的威胁,但是僵尸网络的大小是根据受感染机器进行通信的可观察到的网络接触点的数量得出的。活动通常是对数据包或连接尝试的计数,表示对命令和控制服务器的登录,发送的垃圾邮件,对等通信或其他离散的网络行为。前线分析师使用沙盒测试程序对僵尸网络的恶意软件进行测试,以发现特征码以检测受感染的计算机并将其关闭,但对于僵尸网络种群的建模却较少关注,因为它被互联网协议(IP)的万花筒视图所遮盖地址空间。由于僵尸网络在网络中具有可观察到的活动,因此该研究提出了一种用于僵尸网络通用建模的贝叶斯模型。提出了一种生成分配模型,该模型将在时间t处可观察到的网络活动分为恶意软件生成的计数yt以及网络在可用IP地址之间对这些计数的分配。第一步,框架概述了如何通过沙盒测试和日常用户活动来开发可直接观察的行为模型,然后如何使用此模型作为使用代理或网络地址转换的环境中的人口估计的基础(NAT),其中仅观察到所有机器活动的总和。该模型通过使用Conficker-C僵尸网络的案例研究进行了探索,该网络于2009年3月出现。

著录项

  • 作者

    Weaver, Rhiannon Lisa.;

  • 作者单位

    Carnegie Mellon University.;

  • 授予单位 Carnegie Mellon University.;
  • 学科 Applied Mathematics.;Computer Science.;Statistics.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 204 p.
  • 总页数 204
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号