Computer Science ›› 2013, Vol. 40 ›› Issue (6): 108-110.

Previous Articles     Next Articles

Worm Detection Method Based on Fuzzy Pattern Recognition to Network Behaviors

YAN Fen,CHEN Shuang-shuang and YIN Xin-chun   

  • Online:2018-11-16 Published:2018-11-16

Abstract: Worms have been one of the most serious threats to Internet security due to the significant damage,large range of victims and fast spread.How to detect network worm attack is an important aspect of network security research area.This article proposed a method which detects worms by analyzing and studying typical network behaviors while worms burst out.The algorithm studies the network behaviors of normal and abnormal computer separately,establishes standard fuzzy subsets of classification,and judges if the observation computer infects worms by utilizing fuzzy pattern recognition method.Finally,the experiment with the worm applications in the real world proves that this method is able to detect unknown scanning worms preferably.

Key words: Worm,Detection,Fuzzy pattern recognition,Network behavior

[1] 陈宇峰.蠕虫模拟方法和检测技术研究[D].杭州:浙江大学,2006
[2] 汪伟.网络蠕虫检测技术研究与实现[D].杭州:浙江大学,2006
[3] Chen Yu-feng,Dong Ya-bo,Lu Dong-ming,et al.Detecting randomly scanning worms based on heavy-tailed property[C]∥Proc.of 2005IEEE International Conference on Networking,Sensing and Control.Orlando,Florida,2005:354-358
[4] 肖枫涛.基于网络行为的蠕虫检测关键技术研究[D].长沙:国防科技大学,2009
[5] Robertson S,Siegel E V,Miller M,et al.Surveillance detection in high bandwidth environments[C]∥Proc.of DARPA DISCEX 111Conefrence.2003:130-139
[6] Jung J,Paxson V,Begrer A W,et al.Fast Portscan detection using sequential hypothesis testing[C]∥Proc.of the IEEE Symposium on Security and Privacy.2004:211-225
[7] 付文,魏博,赵荣彩,等.基于模糊推理的程序恶意性分析模型研究[J].通信学报,2010,1(1):44-50
[8] 刘向杰,夏靖波,柴天佑.一类基于正态分布隶属函数的模糊控制策略研究[J].控制与决策,1998,13(4):365-368
[9] 顾雨婕.用于行为分析反木马的模糊分类算法研究[D].杭州:浙江工业大学,2008
[10] 李鸿吉.模糊数学基础及实用算法[M].北京:科学出版社.2005
[11] Moskovitch R,Elovici Y,Rokach L.Detection of unknown computer worms based on behavioral classification of the host[J].Computational Statistics & Data Analysis,2008,52(9):4544-4566
[12] 李晶皎,赵丽红,王爱侠.模式识别[M].北京:北京电子工业出版社,2010
[13] 况晓辉,黄敏桓,许飞.网络蠕虫实验环境构建技术研究[J].计算机科学,2010,7(7):54-56,3

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!