期刊文献+

基于木马通信协议分析的Snort规则的制定

Based on Snort Found a Way Unknown Trojan Horses
下载PDF
导出
摘要 提出了基于木马snort规则的制定的思路,首先,搭建实验环境,分别对两台测试机器种上木马的客户端和服务器端,然后用Wireshark软件对木马客户端和服务器端的网络通信进行捕捉进行分析,并发现网络数据包可疑的特征,最后把发现可疑的特征制定成Snort规则,并用基于Windows的可视化入侵检测进行检测,从而能对已知的木马进行实时报警。 This paper presents the analysis of communication protocols based on the Trojan snort rule-making ideas, first, to build experimental environment, were planted Trojan's client and server on the two test machines, and then use Wireshark software to capture the client and server of Trojan' s Network communications to analysis and found that the characteristics of suspicious network packet and finally extractthe characteristics of suspicious into Snort rules, Finally we use Windows- based visualization intrusion detection to testing, then we can be a Trojan horse known for real-time alerts.
作者 胡明科
机构地区 山东英才学院
出处 《电脑编程技巧与维护》 2012年第22期113-114,共2页 Computer Programming Skills & Maintenance
关键词 SNORT 木马 入侵检测 协议分析 Snort Trojan Intrude detection Protocol Analysis
  • 相关文献

参考文献6

  • 1国家计算机病毒应急处理中心.公安部2008年全闰信息网络安全状况暨计算机病毒疫情调查报告发布会.津举,2008.
  • 2Chess D.The Future of Viruses on the Intemet [OL] . http: // www research.com /antivirus/SciPapers/Chess/Future.html, 2009.
  • 3智能防火墙技术的关键和功能应用http://www.cnread.net/cnreadl/dnwl/wlzs/058.htm,2002.
  • 4Jingmin Zhou, Adam J. Carlson, Davis. Verify Results of Net- work Intrusion Alerts Using I.ightweight Protocol Analysis. Proceedings of the 21st Annual Computer Security Applica- tions Conference (ACSAC 2005).
  • 5Marc Norton, Daniel Roellcer. SNORT 2.0 Protocol Flow Ana- lyzer [ J] . Sourcefire white Paper. Columbia:Sourcefire,lnc, 2004.
  • 6于晗,孙龙霞,黄承夏.基于Windows缓冲区溢出漏洞的植入型木马研究[J].信息安全与通信保密,2005(7):248-252. 被引量:4

二级参考文献10

  • 1张涛,董占球.CODEREDII攻击行为的分析[J].计算机应用与软件,2004,21(6):84-88. 被引量:2
  • 2.[EB/OL].http: //www.cert.org.,.
  • 3.[EB/OL].http: //www. nsfocus.com.,.
  • 4Aleph One. Smashing The Stack For Fun And Profit. Phrack, 7(49),November 1996.
  • 5.Matt Conover溢出机理分析[EB/OL].http: //www.w00w00.org/files/articles/heaptut.txt.,.
  • 6Alfred V.Aho R.Hopcroftand Jeffrey D. Ullman, Compliers:Principles,Techniques and Tools. Addsion-Wesley, Reading, Mass.1985.
  • 7.Rix. SMASHING C++ VPTRS[EB/OL].http: //www.phrack org/show.php?p=56&a=8.,.
  • 8.Warning3.书写Linux下自己的shellcode[EB/OL].http: //security.nsfocus.com/showQueryL. asP? libID=256.,.
  • 9.[EB/OL].http: //www. schneier. com/Schneier_com Attack Trees.htm.,.
  • 10刘绍翰,许建真,张福炎.基于缓冲溢出漏洞的攻击及其预防研究综述[J].计算机应用与软件,2004,21(1):83-87. 被引量:8

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部