首页> 外文OA文献 >An Analysis of Pre-Infection Detection Techniques for Botnets and other Malware
【2h】

An Analysis of Pre-Infection Detection Techniques for Botnets and other Malware

机译:僵尸网络和其他恶意软件的感染前检测技术分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Traditional techniques for detecting malware, such as viruses, worms and rootkits, rely on identifying virus-specific signature definitions within network traffic, applications or memory. Because a sample of malware is required to define an attack signature, signature detection has drawbacks when accounting for malware code mutation, has limited use in zero-day protection and is a post-infection technique requiring malware to be present on a device in order to be detected. udA malicious bot is a malware variant that interconnects with other bots to form a botnet. Amongst their multiple malicious uses, botnets are ideal for launching mass Distributed Denial of Services attacks against the ever increasing number of networked devices that are starting to form the Internet of Things and Smart Cities. Regardless of topology; centralised Command & Control or distributed Peer-to-Peer, bots must communicate with their commanding botmaster. This communication traffic can be used to detect malware activity in the cloud before it can evade network perimeter defences and to trace a route back to source to takedown the threat. udThis paper identifies the inefficiencies exhibited by signature-based detection when dealing with botnets. Total botnet eradication relies on traffic-based detection methods such as DNS record analysis, against which malware authors have multiple evasion techniques. Signature-based detection displays further inefficiencies when located within virtual environments which form the backbone of data centre infrastructures, providing malware with a new attack vector. This paper highlights a lack of techniques for detecting malicious bot activity within such environments, proposing an architecture based upon flow sampling protocols to detect botnets within virtualised environments.
机译:用于检测恶意软件(例如病毒,蠕虫和rootkit)的传统技术依赖于在网络流量,应用程序或内存中识别特定于病毒的签名定义。由于需要使用恶意软件样本来定义攻击签名,因此在考虑恶意软件代码突变时,签名检测存在缺陷,在零日防护中的使用受到限制,并且是一种感染后技术,需要在设备上存在恶意软件才能进行攻击。被检测到。 ud恶意bot是一种恶意软件变体,可以与其他bot互连以形成一个僵尸网络。在其多种恶意用途中,僵尸网络非常适合于发起大规模的分布式拒绝服务攻击,以应对越来越多的网络设备,这些设备已开始构成物联网和智慧城市。不论拓扑如何;集中式Command&Control或分布式Peer-to-Peer,僵尸程序必须与其指挥僵尸程序主机进行通信。此通信流量可用于在逃避网络外围防御之前检测云中的恶意软件活动,并追溯到源头的路由以消除威胁。 ud本文确定了在处理僵尸网络时基于签名的检测所表现出的低效率。彻底清除僵尸网络依赖于基于流量的检测方法,例如DNS记录分析,恶意软件作者对此具有多种逃避技术。当基于签名的检测位于形成数据中心基础架构骨干的虚拟环境中时,效率进一步低下,从而为恶意软件提供了新的攻击媒介。本文着重指出了缺乏在此类环境中检测恶意僵尸活动的技术,提出了一种基于流量采样协议的体系结构来检测虚拟化环境中的僵尸网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号