English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46962/50828 (92%)
造訪人次 : 12474459      線上人數 : 693
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/32071


    題名: 基於網路流量之殭屍網路偵測之研究
    Detection of HTTP Botnet Based on Network Traffic
    作者: 孔新
    貢獻者: 全球商務碩士學位學程碩士班
    關鍵詞: 殭屍網絡檢測
    基於HTTP的殭屍網絡
    HTTP的功能
    C&C通道
    數據挖掘
    決策樹
    Botnet detection
    HTTP-based botnet
    HTTP features
    C&C channel
    Data mining
    Decision tree
    日期: 2016
    上傳時間: 2016-02-24 15:28:26 (UTC+8)
    摘要: Internet has become an essential part of everyday communication and every daily life. Mostly people often go online but do not careful enough to think about the security and how to protect their computer from the threat. Generally, people cannot predict about when and how they get an attack from the threat when they click to the unreliable websites. Botnet is the one kind of most dangerous threat which occurred from using the Internet. The characteristic of botnet is the group of infected computers which connected to the Internet and were controlled by the attacker or hacker to command the operation in several network attacks and several forms. The threat and malicious activities include DDoS attack, spamming, thieving personal information, illegal hosting and sale or rent services, click fraud and adware. There are two popular based on botnet attack. IRC-based botnet is formerly based generation and the HTTP-based botnet is the presently based generation. HTTP-based botnet could be found to identify difficulty because they use the standard HTTP protocol to communicate between bots and botmaster, which means it easier to evade the protection system like the anti-virus programs. Many methods which based on the behavior analysis system were provided to detect the HTTP-based botnet but the botnet still can conceal their behavior from that methods. Therefore, this paper will add the critical of HTTP feature to improve the probability to detect the botnet including the new botnet which never found a pattern before. HTTP features were used to apply the data mining approach with decision tree algorithm to automate detecting the malicious characteristics from a big data. Additionally, the feature filters and algorithms were used to analyze the network packets to trails the evidence of suspicious activities of HTTP botnet. Finally, the confusion matrix will be used to estimate and prove the result for better detection rate.
    顯示於類別:[全球商務學位學程] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML345檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋