...
首页> 外文期刊>Journal in computer virology >A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management
【24h】

A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and management

机译:用于统一检测和管理的模拟统一扫描僵尸网络传播动力学的数学开发

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The contribution of this paper is two-fold. Firstly, we propose a botnet detection approach that is sufficiently timely to enable a containment of the botnet outbreak in a supervised network. Secondly, we show that mathematical models of botnet propagation dynamics are a viable means of achieving that level of defense from bot infections in a supervised network. Our approach is built on the idea of processing network traffic such as to localize a weakly connected subgraph within a graph that models network communications between hosts, and thus consider that subgraph as representative of a suspected botnet. We devise applied statistics to infer the propagation dynamics that would characterize the suspected botnet if this latter were indeed a botnet. The inferred dynamics are materialized into a model graph. A subgraph isomorphism search determines whether or not there is an approximate match between the model graph and any subgraph of the weakly connected subgraph. An approximate match between the two leads to a timely identification of infected hosts. We have implemented this research in the Matlab and Perl programming languages, and have validated it in practice in the Emulab network testbed. In the paper, we describe our approach in detail, and discuss experiments along with experimental data that are indicative of the effectiveness of our approach.
机译:本文的贡献是双重的。首先,我们提出了一种僵尸网络检测方法,该方法足够及时,可以在受控网络中遏制僵尸网络爆发。其次,我们表明,僵尸网络传播动力学的数学模型是一种在受监管的网络中实现针对僵尸程序感染的防御级别的可行方法。我们的方法基于处理网络流量的思想,例如在对主机之间的网络通信建模的图中定位弱连接的子图,从而将该子图视为可疑僵尸网络的代表。如果可疑僵尸网络确实是僵尸网络,我们设计应用统计数据来推断可疑僵尸网络的传播动态。推断的动态化为模型图。子图同构搜索确定模型图和弱连接子图的任何子图之间是否存在近似匹配。两者之间的近似匹配可以及时识别受感染的主机。我们已经用Matlab和Perl编程语言实现了这项研究,并在Emulab网络测试平台上进行了实践验证。在本文中,我们详细描述了我们的方法,并讨论了实验以及表明我们方法有效性的实验数据。

著录项

  • 来源
    《Journal in computer virology》 |2014年第1期|29-51|共23页
  • 作者单位

    1.Faculty of Computer Science University of New Brunswick Fredericton NB Canada;

    1.Faculty of Computer Science University of New Brunswick Fredericton NB Canada;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号