期刊文献+

Session欺骗攻击技术及调查方法研究

The Research of Session Attack and Investigation Method
下载PDF
导出
摘要 Session认证是目前动态网站常用的一种身份识别机制,目前大多数网站利用session认证机制防止非授权访问。如果用户没有通过身份认证,就请求浏览某个限制访问的页面,网站不能从HTTP请求报文中读出合法的session_id,通常就会将非法访问者重定向到登录页面。session欺骗是指攻击者截获受害者的session_id,使用该值登录站点,进而获得合法用户的身份。如果他获得的是管理员身份,那么他就可以修改网站数据,甚至在主页中植入木马,造成更大的危害。这种攻击方式对信息网络安全构成严重威胁,研究session攻击技术及线索调查方法对公安机关的调查、取证工作有重要意义。session欺骗攻击成功实施的关键在于获得合法用户的session_id值。文章研究了在局域网环境中利用交换机MAC地址表的老化现象和MACPORT攻击来截获session_id的方法,研究了在互联网环境中通过XSS攻击截获session_id的方法。通过互联网检索未发现关于session欺骗攻击线索调查方面的相关研究成果。文章提出了基于Referer和HOST字段关联分析的线索调查方法。通过大量实验证明,应用文中提出的线索调查方法可以准确提取入侵痕迹。 Session certiifcation is a common identity recognition mechanism of dynamic website. Most websites use this mechanism to prevent unauthorized access. If the user is not authenticated, then browse to a restricted access page, the site can't read legitimate session_id from the HTTP packet, illegal visitors will be redirected to the login page. Hacker use Session attack to capture the victim's session id, and login to the site by this value. Finally, he can get the victim's identity. If victim is an administrator, then hacker can modify the website data, even plant Trojan, leading to greater harm. It is a serious threat to the security of information network. The research of session attack and investigation method is important to forensic. The key to the successful implementation of session attack is to obtain session_id of legitimate users. Research group found no relevant research results about clue survey area of session spooifng attack.In this paper, three methods to capture session_id are studied such as switch MAC address table "aging" phenomenon, MAC-PORT attack and XSS attack. Investigation method of session attack is also studied.
作者 徐国天
机构地区 中国刑警学院
出处 《信息网络安全》 2014年第8期21-27,共7页 Netinfo Security
基金 公安部应用创新计划[2011YYCXXJXY119]
关键词 SESSION MAC—PORT Referer HOST session MAC-PORT Referer HOST
  • 相关文献

参考文献10

二级参考文献58

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:24
  • 3陈涓,郭传雄.网络钓鱼攻击的在线检测及防治[J].解放军理工大学学报(自然科学版),2007,8(2):133-138. 被引量:6
  • 4Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15.
  • 5PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15.
  • 6Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561.
  • 7Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656.
  • 8Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84.
  • 9D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8.
  • 10Tyler Moore, Richard Clayton. The Impact of Incentives on Notice and Take-down[C]. In Proc. of the 7th Workshop on the Economics of Information Security, New Hampshire USA, June 25-28 2007: 1-24.

共引文献124

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部