CN101699787B - 一种用于对等网络的蠕虫检测方法 - Google Patents
一种用于对等网络的蠕虫检测方法 Download PDFInfo
- Publication number
- CN101699787B CN101699787B CN 200910185425 CN200910185425A CN101699787B CN 101699787 B CN101699787 B CN 101699787B CN 200910185425 CN200910185425 CN 200910185425 CN 200910185425 A CN200910185425 A CN 200910185425A CN 101699787 B CN101699787 B CN 101699787B
- Authority
- CN
- China
- Prior art keywords
- peer
- worm
- network
- peer network
- flow
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910185425 CN101699787B (zh) | 2009-11-09 | 2009-11-09 | 一种用于对等网络的蠕虫检测方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200910185425 CN101699787B (zh) | 2009-11-09 | 2009-11-09 | 一种用于对等网络的蠕虫检测方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101699787A CN101699787A (zh) | 2010-04-28 |
CN101699787B true CN101699787B (zh) | 2013-01-02 |
Family
ID=42148233
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200910185425 Active CN101699787B (zh) | 2009-11-09 | 2009-11-09 | 一种用于对等网络的蠕虫检测方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101699787B (zh) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101867571A (zh) * | 2010-05-12 | 2010-10-20 | 上海电机学院 | 基于协同多个移动代理的智能网络入侵防御系统 |
CN103428212A (zh) * | 2013-08-08 | 2013-12-04 | 电子科技大学 | 一种恶意代码检测及防御的方法 |
CN104901850B (zh) * | 2015-06-12 | 2018-08-31 | 国家计算机网络与信息安全管理中心广东分中心 | 一种恶意代码终端感染机器网络定位方法 |
GB2545744A (en) * | 2015-12-24 | 2017-06-28 | British Telecomm | Malicious network traffic identification |
CN107086944B (zh) * | 2017-06-22 | 2020-04-21 | 北京奇艺世纪科技有限公司 | 一种异常检测方法和装置 |
CN108173834A (zh) * | 2017-12-25 | 2018-06-15 | 北京计算机技术及应用研究所 | 终端指纹技术识别“一卡通”网络终端 |
CN111027063A (zh) * | 2019-09-12 | 2020-04-17 | 北京安天网络安全技术有限公司 | 防止终端感染蠕虫的方法、装置、电子设备及存储介质 |
CN111125703A (zh) * | 2019-12-24 | 2020-05-08 | 沈阳航空航天大学 | 一种基于幂级数rnn的多态网络蠕虫特征码提取 |
-
2009
- 2009-11-09 CN CN 200910185425 patent/CN101699787B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN101699787A (zh) | 2010-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101699787B (zh) | 一种用于对等网络的蠕虫检测方法 | |
Kumar et al. | A Distributed framework for detecting DDoS attacks in smart contract‐based Blockchain‐IoT Systems by leveraging Fog computing | |
She et al. | Blockchain trust model for malicious node detection in wireless sensor networks | |
CN108616534B (zh) | 一种基于区块链防护物联网设备DDoS攻击的方法及系统 | |
CN104509034B (zh) | 模式合并以识别恶意行为 | |
CN107454109A (zh) | 一种基于http流量分析的网络窃密行为检测方法 | |
CN108616529B (zh) | 一种基于业务流的异常检测方法及系统 | |
CN102984140B (zh) | 基于行为片段共享的恶意软件特征融合分析方法及系统 | |
Barzegar et al. | Attack scenario reconstruction using intrusion semantics | |
CN101771702A (zh) | 点对点网络中防御分布式拒绝服务攻击的方法及系统 | |
Narang et al. | PeerShark: flow-clustering and conversation-generation for malicious peer-to-peer traffic identification | |
Ahmed et al. | A misuse-based network intrusion detection system using temporal logic and stream processing | |
Ding et al. | Research and implementation on snort-based hybrid intrusion detection system | |
Cheetancheri et al. | A distributed host-based worm detection system | |
Dai et al. | Eclipse attack detection for blockchain network layer based on deep feature extraction | |
Wang et al. | Interactive analysis of attack graphs using relational queries | |
Tao et al. | A hybrid alarm association method based on AP clustering and causality | |
Sen et al. | Towards an approach to contextual detection of multi-stage cyber attacks in smart grids | |
Chen et al. | A blockchain-based security model for IoT systems | |
Kenaza | An ontology-based modelling and reasoning for alerts correlation | |
Tian et al. | DS evidence theory and its data fusion application in intrusion detection | |
Qi et al. | An APT attack analysis framework based on self-define rules and mapreduce | |
Tian et al. | Hierarchical distributed alert correlation model | |
Abou Haidar et al. | High perception intrusion detection system using neural networks | |
Maasaoui et al. | Network Security Traffic Analysis Platform-Design and Validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20100428 Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000217 Denomination of invention: Worm detection method used for peer-to-peer network Granted publication date: 20130102 License type: Common License Record date: 20161118 |
|
LICC | Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model | ||
EC01 | Cancellation of recordation of patent licensing contract |
Assignee: Jiangsu Nanyou IOT Technology Park Ltd. Assignor: Nanjing Post & Telecommunication Univ. Contract record no.: 2016320000217 Date of cancellation: 20180116 |
|
EC01 | Cancellation of recordation of patent licensing contract |