期刊文献+

基于客户端蜜罐的木马隐蔽通信检测 被引量:2

Detection of Trojan Covert Communication based on Client Honeypot
原文传递
导出
摘要 当今流行的木马程序开始采用隐蔽通信技术绕过蜜罐系统的检测。首先介绍木马常用的隐蔽通信技术以及越来越流行的内核层Rootkit隐蔽通信技术,并讨论了现阶段客户端蜜罐对于恶意程序的检测方式。针对蜜罐网络通信检测机制的不足,提出了一种有效的改进方案,使用基于NDIS中间层驱动的网络数据检测技术来获取木马通信数据包。该方案能够有效检测基于网络驱动的Rootkit隐蔽通信,提取木马关键通信信息,以进行对木马行为的跟踪和分析。 Today's popular Trojans begin to use covert communication technology and bypass the detection of honeypot system. This paper first describes the common Trojan covert communication technologies and the growing popular kernel layer Rootkit covert communication technology, then discusses the current client honeypot detecting methods for malware. Aiming at the deficiency of Honeypot detection mechanisms for network communication, an effective improvement scheme is proposed, By using network traffic detection technology based on the NDIS intermediate driver, the Trojans date packets are acquired. This scheme could effectively detect Rootkit covert communication based on network driver and extract the key communication information for Trojan track and analysis.
出处 《信息安全与通信保密》 2011年第2期49-51,共3页 Information Security and Communications Privacy
关键词 客户端蜜罐 隐蔽通信 ROOTKIT 网络协议驱动 网络协议中间层驱动 client honeypot covert communication Rootkit NDIS protocol driver NDIS intermediate driver
  • 相关文献

参考文献7

  • 1HOLUND Greg, BUTLER James. Rootkit: Subverting the Windows Kernel[M]. [s.l.]: Addison Wesley Professional, 2006." 281-344.
  • 2BAISHAKHI Ray, SHIVAKANT Mishra. Secure and Reliable Covert Channel[C]//ACM. Proceedings of The 4th Annual Workshop on Cyber Security and Information Intelligence Research. New York : ACM Publications, 2008 : 01-03.
  • 3张帆,史彩成.驱动开发技术详解[M].北京:电子工业出版社,2009:506-520.
  • 4杨志程,舒辉,董卫宇.基于NDIS隐蔽通信技术的木马病毒分析[J].计算机工程,2008,34(10):147-149. 被引量:9
  • 5刘敬轩,戴英侠.基于NDIS的IPSec VPN客户端的设计与实现[J].信息安全与通信保密,2006,28(12):191-194. 被引量:3
  • 6樊迅,王轶骏.客户端蜜罐原理及应用研究[J].信息安全与通信保密,2009,31(3):69-71. 被引量:3
  • 7STEENSON R, SEIFERT C. Capture Client Honeypot[DB/OL]. (2007-09-22) [2008-04-05]. https: //projects.honeynet.org/capture-hpc.

二级参考文献14

  • 1任力生,王芳,田云乔.基于NDIS的局域网包获取技术的实现[J].福建电脑,2006,22(4):103-104. 被引量:2
  • 2杨彬,张玉清,宋文敬,胡予濮.基于NDIS中间层即时通监控的研究与实现[J].计算机工程,2006,32(24):135-137. 被引量:5
  • 3刘惠,蔡皖东,赵煜.基于NDIS的防火墙穿透通信技术研究与实现[J].微电子学与计算机,2007,24(5):22-25. 被引量:10
  • 4Seifert C,Steenson R,Holz T,et al.Know Your Enemy:Malicious Web Servers[M].The Honeynet Project,2007.
  • 5Niels Provos.A Virtual Honeypot Framework[C].13th USENIX Security Symposium,San Diego,CA,August 2004.
  • 6Honeynet Project & Research Alliance.Know Your Enemy:Honeywall CDROM Roo[DB/OL].August,2005.http://www.honeynet.org/papers/cdrom/roo/index.html.
  • 7Seifert C,Welch I,Komisarczuk P.HoneyC-The Low-Interaction Client Honeypot[C].Proceedings ofthe 2007 NZCSRCS,Waikato University,Hamilton,New Zealand,April 2007.
  • 8The MITRE Honeyclient Project Team.Honeyclient Project Wiki[DB/OL].Jul,2007.http://www.honeyclient.org/trac/wiki.
  • 9Wang Y.-M.,Beck D,Jiang X,et al.Automated Web Patrol with Strider HoneyMonkeys:Finding Web Sites That Exploit Browser Vulnerabilities[C].In 13th Annual Network and Distributed System Security Symposium(San Diego,2006).
  • 10Steenson R,Seifert C.Capture Client Honeypot[DB/OL].Apt,2008.https://projects.honeynet.org/capture-hpc.

共引文献12

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部