计算机科学 ›› 2013, Vol. 40 ›› Issue (6): 108-110.

• 信息安全 • 上一篇    下一篇

基于网络行为模糊模式识别的蠕虫检测方法

严芬,陈霜霜,殷新春   

  1. 扬州大学信息工程学院 扬州225127;扬州大学信息工程学院 扬州225127;扬州大学信息工程学院 扬州225127
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受江苏省高校自然科学研究项目(10KJB520020),国家863计划项目(2007AA01Z448),江苏省科技支撑计划基金项目(BE2008124)资助

Worm Detection Method Based on Fuzzy Pattern Recognition to Network Behaviors

YAN Fen,CHEN Shuang-shuang and YIN Xin-chun   

  • Online:2018-11-16 Published:2018-11-16

摘要: 网络蠕虫攻击由于危害大、攻击范围广、传播速度快而成为因特网危害最大的攻击方式之一。如何有效地检测网络蠕虫攻击是当前网络安全研究领域的一个重要方向。通过对网络蠕虫攻击行为的分析和研究,提出了一种根据蠕虫爆发时产生的典型网络行为来检测未知蠕虫的方法。该算法通过分别学习正常主机和受感染主机的网络行为建立相应的标准分类模糊子集,然后利用模糊模式识别法判定待测主机是否感染蠕虫。最后进行实验验证,结果表明,该方法对未知扫描类蠕虫有较好的检测效果。

关键词: 蠕虫,检测,模糊模式识别,网络行为

Abstract: Worms have been one of the most serious threats to Internet security due to the significant damage,large range of victims and fast spread.How to detect network worm attack is an important aspect of network security research area.This article proposed a method which detects worms by analyzing and studying typical network behaviors while worms burst out.The algorithm studies the network behaviors of normal and abnormal computer separately,establishes standard fuzzy subsets of classification,and judges if the observation computer infects worms by utilizing fuzzy pattern recognition method.Finally,the experiment with the worm applications in the real world proves that this method is able to detect unknown scanning worms preferably.

Key words: Worm,Detection,Fuzzy pattern recognition,Network behavior

[1] 陈宇峰.蠕虫模拟方法和检测技术研究[D].杭州:浙江大学,2006
[2] 汪伟.网络蠕虫检测技术研究与实现[D].杭州:浙江大学,2006
[3] Chen Yu-feng,Dong Ya-bo,Lu Dong-ming,et al.Detecting randomly scanning worms based on heavy-tailed property[C]∥Proc.of 2005IEEE International Conference on Networking,Sensing and Control.Orlando,Florida,2005:354-358
[4] 肖枫涛.基于网络行为的蠕虫检测关键技术研究[D].长沙:国防科技大学,2009
[5] Robertson S,Siegel E V,Miller M,et al.Surveillance detection in high bandwidth environments[C]∥Proc.of DARPA DISCEX 111Conefrence.2003:130-139
[6] Jung J,Paxson V,Begrer A W,et al.Fast Portscan detection using sequential hypothesis testing[C]∥Proc.of the IEEE Symposium on Security and Privacy.2004:211-225
[7] 付文,魏博,赵荣彩,等.基于模糊推理的程序恶意性分析模型研究[J].通信学报,2010,1(1):44-50
[8] 刘向杰,夏靖波,柴天佑.一类基于正态分布隶属函数的模糊控制策略研究[J].控制与决策,1998,13(4):365-368
[9] 顾雨婕.用于行为分析反木马的模糊分类算法研究[D].杭州:浙江工业大学,2008
[10] 李鸿吉.模糊数学基础及实用算法[M].北京:科学出版社.2005
[11] Moskovitch R,Elovici Y,Rokach L.Detection of unknown computer worms based on behavioral classification of the host[J].Computational Statistics & Data Analysis,2008,52(9):4544-4566
[12] 李晶皎,赵丽红,王爱侠.模式识别[M].北京:北京电子工业出版社,2010
[13] 况晓辉,黄敏桓,许飞.网络蠕虫实验环境构建技术研究[J].计算机科学,2010,7(7):54-56,3

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!