期刊文献+

使用随机选择网络地址抵抗目标列表蠕虫 被引量:3

Defending against Hitlist Worms using Network Address Space Randomization
在线阅读 下载PDF
导出
摘要 由于预先搜集漏洞的目标列表蠕虫很难被检测到并且传播速度快,所以那些自动预防机制可能无法及时做出反应。在此试验了一种新的称作随机网络地址的前摄预防机制,其目标是加固网络尤其是抵抗目标列表蠕虫,探索并介绍了其原型,试验了方法的有效性及局限性。此方法通过频繁更改主机地址的方法使得目标列表失效,达到限制或是减慢了目标列表蠕虫的感染速度并且迫使他们暴露特征,使得他们更容易在边界处就被清除。 It's hard to detecting hitlist worm when it collects vulnerability in advance. And hitlist worm has a high speed of propagation , so automated defenses may not be able to react in a timly. The article examines a new proactive defense mechanism called network address space randomization whose objective is to harden networks specifically against hitlist worm. We explore and introduce a prototype of it as well as examining the effectiveness and limitations of the approach. The idea behind this method is that hitlist information could be rendered stale if hosts are forced to frequently change their IP addresses. Network address space randomization limits or slows down hitlist worms and forced them exhibit features that make them easier to clear at the perimeter.
出处 《微计算机信息》 2009年第6期85-87,共3页 Control & Automation
关键词 随机选择 目标列表 蠕虫 网络安全 Radomization Hitlist Worms Network Security
  • 相关文献

参考文献6

  • 1王道俊,王海峰.基于人工免疫的蠕虫防御系统研究与设计[J].微计算机信息,2007,23(02X):61-62. 被引量:4
  • 2S. Staniford, D. Moore, V. Paxson, and N. Weaver. The top speed of flash worms[J]. In Proc. ACM CCS WORM, Oct. 2004.
  • 3BERK V H, GRAY R S, BAKOS G. Using sensor networks and data fusion for early detection of active worms [A]. Proceedings of the SPIEeroSense[C]. 2003. 92-104.
  • 4S. Bhatkar, D. DuVarney, and R. Sekar. Address obfuscation: An efficient approach to combat a broad range of memory error exploits. In Proceedings of the 12th USENIX Security Symposium, 105 - 120, Aug. 2003.
  • 5李胜利,王杰,韩宗芬,陶智飞.一种新的蠕虫检测和控制方法[J].华中科技大学学报(自然科学版),2007,35(3):38-41. 被引量:2
  • 6N. Weaver, S. Staniford, and V. Paxson. Very Fast Containment of Scanning Worms. In Proceedings of the 13th USENIX Security Symposium, 29 - 44, Aug. 2004.

二级参考文献8

  • 1汪晓妍,傅德胜.生物特征识别中的信息融合技术[J].微计算机信息,2005,21(10S):148-153. 被引量:17
  • 2Kim H,Karp B.Autograph:toward automated,distributed worm signature detection[C]∥Proceedings of the 13th USENIX Security Symposium.San Mateo:USENIX Association,2004:271-286.
  • 3Singh S,Estan C,Varghese G,et al.Automated worm fingerprinting[C]∥Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation(OSDI).San Francisco:USENIX Association,2004:45-60.
  • 4Chen S,Tang Y.Slowing down Internet worms[C]∥Proceedings of the 24th International Conference on Distributed Computing Systems.Tokyo:IEEE Computer Society,2004:312-319.
  • 5Williamson M M.Throttling viruses:restricting propagation to defeat malicious mobile code[C]∥Proceedings of the 18th Annual Computer Security Applications Conference.Washington:IEEE Computer Society,2002:61-68.
  • 6Twycross J,Williamson M M.Implementing and testing a virus throttle[C]∥Proceedings of the 12th USENIX Security Symposium.Boston:USENIX Association,2003:285-294.
  • 7Dasgupta D(1999) Artificial Immune System and Their Applications.Springer-Verlag,Berlin.
  • 8Stephanie Forrest.Self-Nonself Discrimination in a Computer.1999.

共引文献4

同被引文献21

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部