...
首页> 外文期刊>Network Protocols and Algorithms >Characterization and Modeling of Top Spam Botnets
【24h】

Characterization and Modeling of Top Spam Botnets

机译:顶级垃圾邮件僵尸网络的表征和建模

获取原文
           

摘要

The increasing impact of the Internet in the global economy has transformed Botnets into one of the most relevant security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to be a field with big challenges to address. Several approaches can be taken to study Botnets: analyze its source code, which can be a hard task mainly due to license restrictions; study the control mechanism, particularly the activity of its Command and Control server(s); study its behavior, by measuring real traffic and collecting relevant statistics. In this work, we have installed some of the most popular spam Botnets, captured the originated traffic and characterized it in order to identify the main trends/patterns of their activity. From the intensive statistics that were collected, it was possible to conclude that there are distinct features between Botnets that can be explored to build efficient detection methodologies. Based on this study, the second part of the paper proposes a generic and systematic model to describe the network dynamics whenever a Botnet threat is detected, defining all actors, dimensions, states and actions that need to be taken into account at each moment. We believe that this type of modeling approach is the basis for developing systematic and integrated frameworks and strategies to predict and fight Botnet threats in an efficient way.
机译:互联网对全球经济的影响越来越大,僵尸网络已成为对公民,组织和政府最重要的安全威胁之一。尽管在过去的几年中人们已经做出了巨大的努力来理解这种现象并开发检测技术和对策,但这仍然是一个充满挑战的领域。可以采用以下几种方法来研究僵尸网络:分析其源代码,这主要是由于许可证限制而很难完成的工作;研究控制机制,特别是其命令和控制服务器的活动;通过测量实际流量并收集相关统计信息来研究其行为。在这项工作中,我们安装了一些最受欢迎的垃圾邮件僵尸网络,捕获了原始流量并对其进行了特征化分析,以识别其活动的主要趋势/模式。从收集到的大量统计数据中,可以得出结论,僵尸网络之间存在独特的特征,可以探索这些特征来构建有效的检测方法。基于这项研究,本文的第二部分提出了一个通用的系统模型,用于描述检测到僵尸网络威胁时的网络动态,定义了每个时刻都需要考虑的所有参与者,规模,状态和行动。我们认为,这种建模方法是开发系统和集成的框架和策略的基础,以有效地预测和抵御僵尸网络的威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号