期刊文献+

基于NDIS的Anti-Xprobe2实现技术研究 被引量:2

Research on Technology of Anti-Xprobe2 Based on NDIS
下载PDF
导出
摘要 Xprobe2通过模糊矩阵统计分析主动探测数据报对应的ICMP数据报特征,进而探测得到远端操作系统的类型。在分析Xprobe2实现机制的基础上,通过对探测数据报进行检测,并以指定的操作系统特征为模板,对输出ICMP数据报进行伪装,实现防御Xprobe2探测。基于ND IS给出了实现的体系机构,并对事件分离模块和伪装应答模块进行了详细的讨论。测试结果显示,该方案能有效的防御Xprobe2主动探测,实现了对操作系统指纹的伪装。 Xprobe2 combines various remote active operating system fingerprinting methods using the ICMP protocol, and it utilizes a matrix based fuzzy logic to analyzing the results produced by various remote active operating system fingerprinting tests. Based on analyzing the mechanism of Xprobe2, this paper describes the design of Anti - xprobe2 which defenses OS fingerprinting detection of Xprobe2 by camouflaging response packets. It also gives the architecture of Anti -xprobe2 and discusses the event separator module and packets camouflage module in detail based on NDIS. The test result displays that this intermediate driver defense the detection of Xprobe2 successfully.
出处 《航空计算技术》 2006年第2期67-69,73,共4页 Aeronautical Computing Technique
基金 国家自然基金"网络伪装协同安全模型研究"(60503008)
关键词 网络安全 NDIS 操作系统指纹 Anti-xporbe2 network security NDIS OS fingerprinting anti - xprobe2
  • 相关文献

参考文献12

  • 1CERT Coordination Center.CERT Annual Reports[EB/OL]].http://www.cert.org/,2004-12.
  • 2Chris Trowbridge.An Overview of Remote Operating System Fingerprinting[J/OL].http://www.sans.org/rr/ whitepapers/testing/1231.php,2003-7.
  • 3Jiang Wei-hua,Li Wei-hua,Du Jun.The Application of ICMP in network Scanning[J].IEEE,2003.
  • 4Ofir Arkin,Fyodor Yarochkin.XProbe2-A 'Fuzzy' Approach to Remote Active Operating System Fingerprinting[EB/OL].http://www.sys-security.com/ archive/ papers/Xprobe2.pdf,2002-8.
  • 5Ofir Arkin,Fyodor Yarochkin.The Present and Future of Xprobe2-The Next Generation of Active Operating System Fingerprinting[EB/OL].http://www.sys-security.com/ archive/papers,2005-2.
  • 6MICROSOFT.DDK for Windows2000[CP/DK].2000-8.
  • 7GR Malan,D Watson,F Jahanian,,P.Howell.Transport and Application Protocol Scrubbing[A].IEEE INFOCOM[C].Israel:IEEE Inc,2000.1381-1390.
  • 8Matthew Smart,G.Rober Malan,Farnam Jahanian.Defeating TCP/IP Stack Fingerprinting[C].The 9TH USENIX Security Symposium,Denver,Colorado,2000.229-240.
  • 9He Ju-hou,He Xiu-qing,Li Wei-hua.A Practical Defense System for Remote OS Detection[C].ICISA ACNS04,Yellow Mountain,China,2004.135-140.
  • 10朱燕辉.Windows防火墙与网络封包截获技术[M].北京:电子工业出版社,2002..

共引文献2

同被引文献13

  • 1中国信息安全测评中心中国国家信息安全漏洞库.信息安全漏洞月通报[EB/OL].[2012-02].http://www.cnnvd.org.cn/news/jkl/id/1330997640.pdf/pid/1022.
  • 2Trowbridge C.An overview of remote operating system fingerprinting[EB/OL].[2011-07].http://www.sans.org/rr/whitepapers/testing/1231.php.
  • 3Jiang Wei-hua,Li Wei-hua,Du Jun.The application of ICMP in network scanning[C]//Parallel and Distributed Computing,Applications and Technologies.Chengdu:IEEE Inc,2003:904-906.
  • 4Arkin O,Yarochkin F.Xprobe2-a“fuzzy”approach to remote active operating system fingerprinting[EB/OL].[2011-06].http://www.sys-security.com/archive/papers/Xprobe2.pdf.
  • 5Arkin O,Yarochkin F.The present and future of Xprobe2-the next generation of active operating system finger-printing[EB/OL].[2011-06].http://www.sys-security.com/archive/papers.
  • 6Yarochkin F V,Arkin O,Kydyraliev M.Xporbe2++:low volume remote network information gathering tool[C]//Dependable Systems&Networks.Estoril:IEEE/IFIP,2009:205-210.
  • 7Wagner F,Schmuki R,Wagner T.Modeling software with finite state machines:a practical approach[M].[S.l.]:Auer-bach Publications,2006.
  • 8Lee L C.Interception and automating blocking of malicious traffic based on NDIS intermediate drive[EB/OL].[2012-02].http://www.sans.org.
  • 9Antognini J,Divine T F.Extending the Microsoft PassThru NDIS intermediate driver-part2:two IP address blocking NDIS IM drivers[EB/OL].[2011-06].http://www.wd-3.com/archive/ExtendingPassthru2.htm.
  • 10Malan G R,Watson D,Jahanian F,et al.Transport and application protocol scrubbing[C]//INFOCOM.Israel:IEEE Inc,2000:1381-1390.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部