...
首页> 外文期刊>Information Forensics and Security, IEEE Transactions on >Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity
【24h】

Visualizing and Modeling the Scanning Behavior of the Conficker Botnet in the Presence of User and Network Activity

机译:在存在用户和网络活动的情况下可视化和建模Conficker僵尸网络的扫描行为

获取原文
获取原文并翻译 | 示例
           

摘要

Translating behavioral information learned from analysis of a botnet’s software in controlled environments, to a model of how the botnet behaves in the wild is complicated by the fact that controlled environments do not account for a wide variety of user behavior, and that machines are not associated one-to-one with IP addresses. This paper presents a case study using published reports and pertinent visualizations to develop and evaluate a single-machine model of scanning behavior of the Conficker-C botnet, with a goal of understanding the global population of infected machines in light of user activity and IP address allocation.
机译:由于受控环境不能解决各种各样的用户行为,并且机器没有关联,因此将通过对受控环境中的僵尸网络软件的分析所学的行为信息转换为僵尸网络在野外行为的模型非常复杂。与IP地址一对一。本文提供了一个案例研究,使用已发布的报告和相关的可视化工具来开发和评估Conficker-C僵尸网络的扫描行为的单机模型,目的是根据用户活动和IP地址了解受感染机器的全球数量。分配。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号