• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

僵尸网络发展研究

李可, 方滨兴, 崔翔, 刘奇旭

李可, 方滨兴, 崔翔, 刘奇旭. 僵尸网络发展研究[J]. 计算机研究与发展, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
引用本文: 李可, 方滨兴, 崔翔, 刘奇旭. 僵尸网络发展研究[J]. 计算机研究与发展, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
Citation: Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. DOI: 10.7544/issn1000-1239.2016.20160419
李可, 方滨兴, 崔翔, 刘奇旭. 僵尸网络发展研究[J]. 计算机研究与发展, 2016, 53(10): 2189-2206. CSTR: 32373.14.issn1000-1239.2016.20160419
引用本文: 李可, 方滨兴, 崔翔, 刘奇旭. 僵尸网络发展研究[J]. 计算机研究与发展, 2016, 53(10): 2189-2206. CSTR: 32373.14.issn1000-1239.2016.20160419
Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. CSTR: 32373.14.issn1000-1239.2016.20160419
Citation: Li Ke, Fang Binxing, Cui Xiang, Liu Qixu. Study of Botnets Trends[J]. Journal of Computer Research and Development, 2016, 53(10): 2189-2206. CSTR: 32373.14.issn1000-1239.2016.20160419

僵尸网络发展研究

基金项目: 国家自然科学基金项目(61303239);广东省产学研合作项目“广东省健康云安全院士工作站”(2016B090921001) This work was supported by the National Natural Science Foundation of China (61303239) and the Industry-University-Research Cooperation Project of Guangdong Province (2016B090921001).
详细信息
  • 中图分类号: TP393

Study of Botnets Trends

  • 摘要: 僵尸网络(botnet)作为最有效的网络攻击平台,给当今互联网安全带来了巨大威胁.虽然近几年关于僵尸网络的攻防技术研究取得了显著进展,然而,伴随着互联网应用的多元化以及通信技术的不断革新,僵尸网络的形态和命令控制机制也在不断发生变化,这给防御人员带来了新的挑战.深入了解僵尸网络运行机理和发展趋势对有效应对僵尸网络引发的安全威胁具有重要意义.以僵尸网络攻击技术为核心,从形式化定义、传播方式、生命周期、恶意行为、命令控制信道方面对僵尸网络机理进行全面介绍,按时间顺序将僵尸网络的发展历程划分为PC攻击和广泛攻击2个阶段,对各阶段的技术特点、行为特性、代表案例以及演化规律进行详细阐述,总结当今僵尸网络防御方法和研究成果,对已有研究遗留的问题和未来可能研究热点进行讨论.
    Abstract: Botnets, as one of the most effective platforms to launch cyber-attacks, pose great threats to the security of today’s cyber-space. Despite the fact that remarkable progress had been made in the researches of botnets’ both attack and defense technologies in recent years, the forms and command and control mechanisms of botnets, however, as Internet applications are put into a wider variety of uses and communication technologies upgraded more rapidly than ever, are also undergoing constant changes, bringing new challenges to defenders. For this reason, an in-depth investigation of botnets’ working mechanisms and development is of great significance to deal with the threats posed by botnets. This paper, with the attack technologies of botnets as its main focus, gives an comprehensive introduction of the working mechanisms of botnets in terms of its definition, transmission, lifecycle, malicious behaviors and command and control channels, and divides the botnets’ development into two stages, namely, attacks to traditional PC and extensive attacks, with the technological features, behavioral characteristics, case studies and evolutionary patterns of each stage elaborated in a detailed manner. After a summary of existing work on the defense of botnets with the limitations of each approach discussed, possible future attempts are presented.
计量
  • 文章访问数:  2498
  • HTML全文浏览量:  0
  • PDF下载量:  1532
  • 被引次数: 0
出版历程
  • 发布日期:  2016-09-30

目录

    /

    返回文章
    返回