首页> 外文会议>Second Cybercrime and Trustworthy Computing Workshop >Protecting Web 2.0 Services from Botnet Exploitations
【24h】

Protecting Web 2.0 Services from Botnet Exploitations

机译:保护Web 2.0服务不受僵尸网络利用

获取原文

摘要

Recently, botnet, a network of compromised computers, has been recognized as the biggest threat to the Internet. The bots in a botnet communicate with the botnet owner via a communication channel called Command and Control (C&C) channel. There are three main C&C channels: Internet Relay Chat (IRC), Peer-to-Peer (P2P) and web-based protocols. By exploiting the flexibility of the Web 2.0 technology, the web-based botnet has reached a new level of sophistication. In August 2009, such botnet was found on Twitter, one of the most popular Web 2.0 services. In this paper, we will describe a new type of botnet that uses Web 2.0 service as a C&C channel and a temporary storage for their stolen information. We will then propose a novel approach to thwart this type of attack. Our method applies a unique identifier of the computer, an encryption algorithm with session keys and a CAPTCHA verification.
机译:最近,僵尸网络(一个受到感染的计算机网络)被公认为对Internet的最大威胁。僵尸网络中的僵尸程序通过称为命令和控制(C&C)通道的通信通道与僵尸网络所有者进行通信。有三个主要的C&C渠道:Internet中继聊天(IRC),对等(P2P)和基于Web的协议。通过利用Web 2.0技术的灵活性,基于Web的僵尸网络已达到新的高度。 2009年8月,在最流行的Web 2.0服务之一Twitter上发现了这种僵尸网络。在本文中,我们将描述一种新型的僵尸网络,该僵尸网络将Web 2.0服务用作C&C通道,并临时存储其被盗信息。然后,我们将提出一种新颖的方法来阻止此类攻击。我们的方法应用计算机的唯一标识符,带有会话密钥的加密算法和CAPTCHA验证。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号