• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用蜜罐模拟对医疗物联网的僵尸网络攻击。

Using honeypots to model botnet attacks on the internet of medical things.

作者信息

Wang Huanran, He Hui, Zhang Weizhe, Liu Wenmao, Liu Peng, Javadpour Amir

机构信息

School of Cyberspace Science, Harbin Institute of Technology, Harbin, China.

Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China.

出版信息

Comput Electr Eng. 2022 Sep;102:108212. doi: 10.1016/j.compeleceng.2022.108212. Epub 2022 Jul 8.

DOI:10.1016/j.compeleceng.2022.108212
PMID:35821875
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC9264116/
Abstract

Corona Virus Disease 2019 (COVID-19) has led to an increase in attacks targeting widespread smart devices. A vulnerable device can join multiple botnets simultaneously or sequentially. When different attack patterns are mixed with attack records, the security analyst produces an inaccurate report. There are numerous studies on botnet detection, but there is no publicly available solution to classify attack patterns based on the control periods. To fill this gap, we propose a novel data-driven method based on an intuitive hypothesis: bots tend to show time-related attack patterns within the same botnet control period. We deploy 462 honeypots in 22 countries to capture real-world attack activities and propose an algorithm to identify control periods. Experiments have demonstrated our method's efficacy. Besides, we present eight interesting findings that will help the security community better understand and fight botnet attacks now and in the future.

摘要

2019冠状病毒病(COVID-19)导致针对广泛使用的智能设备的攻击有所增加。一个易受攻击的设备可以同时或相继加入多个僵尸网络。当不同的攻击模式与攻击记录混合在一起时,安全分析师会生成一份不准确的报告。关于僵尸网络检测有大量研究,但尚无基于控制期对攻击模式进行分类的公开可用解决方案。为了填补这一空白,我们基于一个直观的假设提出了一种新颖的数据驱动方法:僵尸程序在同一僵尸网络控制期内倾向于表现出与时间相关的攻击模式。我们在22个国家部署了462个蜜罐来捕获现实世界中的攻击活动,并提出了一种识别控制期的算法。实验证明了我们方法的有效性。此外,我们还展示了八项有趣的发现,这将有助于安全社区更好地理解并在现在和未来对抗僵尸网络攻击。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/c5acef7e5336/gr15_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/2def5c57af33/ga1_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/7a295f27a50f/gr1_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/3bc7a1302dc0/gr2_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/884e31c34d81/gr3_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/8e4cd9df15b6/gr4_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/9c5cd6125ea2/fx1001_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/fd4f06067f19/fx1002_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/d9460f1e182b/gr5_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/3ebe352fd6e2/gr6_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ec5293dc57bd/gr7_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/b723186f78ff/gr8_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/9134909cfa2a/gr9_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/713d010e2e0f/gr10_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ae12fcad284b/gr11_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ab196fdd4228/gr12_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/8291a2a0d292/gr13_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/e6508f2f5883/gr14_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/c5acef7e5336/gr15_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/2def5c57af33/ga1_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/7a295f27a50f/gr1_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/3bc7a1302dc0/gr2_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/884e31c34d81/gr3_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/8e4cd9df15b6/gr4_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/9c5cd6125ea2/fx1001_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/fd4f06067f19/fx1002_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/d9460f1e182b/gr5_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/3ebe352fd6e2/gr6_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ec5293dc57bd/gr7_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/b723186f78ff/gr8_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/9134909cfa2a/gr9_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/713d010e2e0f/gr10_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ae12fcad284b/gr11_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/ab196fdd4228/gr12_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/8291a2a0d292/gr13_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/e6508f2f5883/gr14_lrg.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/94b0/9264116/c5acef7e5336/gr15_lrg.jpg

相似文献

1
Using honeypots to model botnet attacks on the internet of medical things.利用蜜罐模拟对医疗物联网的僵尸网络攻击。
Comput Electr Eng. 2022 Sep;102:108212. doi: 10.1016/j.compeleceng.2022.108212. Epub 2022 Jul 8.
2
Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning.基于机器学习的 SDN 赋能物联网中的僵尸网络攻击检测综述。
Sensors (Basel). 2022 Dec 14;22(24):9837. doi: 10.3390/s22249837.
3
IoT Botnet Attack Detection Based on Optimized Extreme Gradient Boosting and Feature Selection.基于优化极端梯度提升和特征选择的物联网僵尸网络攻击检测。
Sensors (Basel). 2020 Nov 6;20(21):6336. doi: 10.3390/s20216336.
4
Examination of Traditional Botnet Detection on IoT-Based Bots.基于物联网的僵尸网络中传统僵尸网络检测的研究
Sensors (Basel). 2024 Feb 5;24(3):1027. doi: 10.3390/s24031027.
5
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture.基于机器学习的物联网僵尸网络攻击检测的序列架构。
Sensors (Basel). 2020 Aug 5;20(16):4372. doi: 10.3390/s20164372.
6
Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques.物联网僵尸网络分布式拒绝服务攻击的系统文献综述及检测技术评估
Sensors (Basel). 2024 Jun 1;24(11):3571. doi: 10.3390/s24113571.
7
Lightweight Internet of Things Botnet Detection Using One-Class Classification.基于单类分类的轻量级物联网僵尸网络检测。
Sensors (Basel). 2022 May 10;22(10):3646. doi: 10.3390/s22103646.
8
Cross Deep Learning Method for Effectively Detecting the Propagation of IoT Botnet.基于交叉深度学习的物联网僵尸网络传播检测方法
Sensors (Basel). 2022 May 20;22(10):3895. doi: 10.3390/s22103895.
9
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning.基于蜜罐与机器学习的物联网智能工厂中僵尸网络攻击分类
PeerJ Comput Sci. 2021 Jan 25;7:e350. doi: 10.7717/peerj-cs.350. eCollection 2021.
10
Ensemble averaging deep neural network for botnet detection in heterogeneous Internet of Things devices.用于异构物联网设备中僵尸网络检测的集成平均深度神经网络。
Sci Rep. 2024 Feb 16;14(1):3878. doi: 10.1038/s41598-024-54438-6.

引用本文的文献

1
Security Analysis for Smart Healthcare Systems.智能医疗保健系统的安全分析。
Sensors (Basel). 2024 May 24;24(11):3375. doi: 10.3390/s24113375.
2
Interleaved Honeypot-Framing Model with Secure MAC Policies for Wireless Sensor Networks.交错蜜罐-框架模型与无线传感器网络的安全 MAC 策略。
Sensors (Basel). 2022 Oct 21;22(20):8046. doi: 10.3390/s22208046.