作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (17): 119-121,139. doi: 10.3969/j.issn.1000-3428.2011.17.039

• 安全技术 • 上一篇    下一篇

基于网络通信指纹的启发式木马识别系统

唐彰国,李焕洲,钟明全,张 健   

  1. (四川师范大学网络与通信技术研究所,成都 610066)
  • 收稿日期:2011-02-28 出版日期:2011-09-05 发布日期:2011-09-05
  • 作者简介:唐彰国(1978-),男,讲师、硕士,主研方向:指纹识别,网络安全;李焕洲,副教授、博士;钟明全,讲师、硕士;张 健,讲师、博士研究生
  • 基金资助:
    四川省应用基础研究基金资助项目(07JY029-011);四川省教育厅基金资助项目(08ZA043)

Heuristic Trojan Identification System Based on Network Communication Fingerprint

TANG Zhang-guo, LI Huan-zhou, ZHONG Ming-quan, ZHANG Jian   

  1. (Institute of Network and Communication Technology, Sichuan Normal University, Chengdu 610066, China)
  • Received:2011-02-28 Online:2011-09-05 Published:2011-09-05

摘要: 对比传统木马检测技术的原理及特点,根据网络数据流检测木马的需求,提出一种基于网络通信特征分析的木马识别方法。引入通信指纹的概念扩展通信特征的外延,用实验方法归纳木马在连接、控制和文件传输阶段表现出的通信指纹信息,设计并实现一个启发式木马网络通信指纹识别系统。测试结果表明,该系统运行高效、检测结果准确。

关键词: 木马识别, 通信指纹, 启发式, 深度包检测, 数据流

Abstract: This paper discusses the trojan detection technique, and a detail contrast research of related characters is given. In order to provide trojan detection based on network data flow, a trojan identification method based on network communication fingerprint is broutht forward. The concept of communication fingerprint is introduced to expand the extension of the communication features. Through the experimental method the fingerprints information of trojan for each phase such as connection, control and file transfer can be highlighted. On that basis, a heuristic identification system for trojan based on network communication fingerprint is designed and implemented. Test results indicate that the system runs efficient and the results are accurate.

Key words: trojan identification, communication fingerprint, heuristic, Deep Packet Inspection(DPI), data flow

中图分类号: