期刊文献+

基于网络协议逆向分析的远程控制木马漏洞挖掘 被引量:10

Remote Control Trojan Vulnerability Mining Based on Reverse Analysis of Network Protocol
下载PDF
导出
摘要 为防范持续性威胁攻击中的远程控制木马,提出一种主动防御思路,即针对不公开源代码和网络协议的木马程序进行漏洞挖掘和瘫痪攻击。使用广义后缀树和分层次聚类等数据挖掘算法逆向分析木马网络协议的特征,自动构造其协议格式。将其与Fuzz测试框架相结合,通过导入之前逆向分析得出的协议格式自动生成Fuzz的配置文件,从而较大程度地提高模糊测试和漏洞挖掘效率。经过一系列针对实际远程控制木马程序的测试,发现若干木马控制端的漏洞,从而说明该远程控制木马漏洞挖掘方法是可行、有效的,并具有一定创新性。 In view of Trojan's control of the popular Advanced Persistent Threat( APT) attack's method,this paper presents an active defense idea,namely for fuzzing and paralysis attack of closed source code Trojan. It uses generalized suffix tree and hierarchical clustering algorithm to learn characteristics of Trojan's network traffic to construct protocol format. Then it combines Peach with this Fuzz framework,automatically generating configuration file of Fuzz test through the protocol format,so as to largely enhance efficiency of Fuzz test. After a series of tests through remote control Trojan,it successfully discovers several Trojan 's vulnerabilities,which illustrates that the remote control Trojan vulnerability mining method is a kind of innovative and effective solution.
出处 《计算机工程》 CAS CSCD 北大核心 2016年第2期146-150,156,共6页 Computer Engineering
基金 中国信息安全测评中心科研基金资助项目(CNITSEC-KY-2013-009/2)
关键词 远程控制木马 网络协议逆向分析 Fuzz测试 漏洞挖掘 瘫痪攻击 remote control trojan reverse analysis of network protocol Fuzz test vulnerability mining paralysis attack
  • 相关文献

参考文献8

  • 1张帅.对APT攻击的检测与防御[J].信息安全与技术,2011,2(9):125-127. 被引量:28
  • 2陈剑锋,王强,伍淼.网络APT攻击及防范策略[J].信息安全与通信保密,2012,10(7):24-27. 被引量:31
  • 3林龙成,陈波,郭向民.传统网络安全防御面临的新威胁:APT攻击[J].信息安全与技术,2013,4(3):20-25. 被引量:25
  • 4Ukkonen E.On-line Construction of Suffix Trees[J].Algorithmica,1995,14(3):249-260.
  • 5Chi L,Hui K.Color Set Size Problem with Applications To String Matching[C]//Proceedings of the 3rd Symposium on Combinatorial Pattern Machine.Berlin,Germany:Springer,1992:230-243.
  • 6Mac Queen J B.Some Methods for Classification and Analysis of Multivariate Observations[C]//Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability.Berlin,Germany:Springer,1967:281-297.
  • 7Fischer J,Heun V.Theoretical and Practical Improvements on the RMQ-problem with Applications to LCA and LCE[C]//Proceedings of the 17th Annual Sympo-sium on Combinatorial Pattern Matching.Berlin,Germany:Springer,2006:36-48.
  • 8Poison Ivy 2.3.2 C&C Server Buffer Overflow[EB/OL].(2012-07-06).http://www.exploit-db.com/exploits/19613/.

二级参考文献30

  • 1叶蓬.APT攻击实例研究与企业现有防御体系缺陷分析[EB/OL].[2011].http://netsecurity.51cto.corn/art.
  • 2Flashsky.我看APT攻防对抗:APT攻击的特性[EB/OL].[2012].http://hi.baidu.com/fs_fx/.
  • 3Wiki. Ghost Net[EB/OL].http://zh.wikipedia.org/wiki/GhostNet,.
  • 4Wiki. Operation Aurora[EB/OL].http://en.wikipedia.org/wiki/Operation_Aurora,.
  • 5Wiki. Stuxnet[EB/OL].http://zh.wikipedia.org/wiki/Stuxnet,.
  • 6Coviello A. Open Letter to RSA Customers[EB/OL].http://www.rsa.com/node.aspx?id=3872,.
  • 7Symantec. W32.Duqu:The Precursor to the Next Stuxnet[EB/OL].http://www.symantec.com/connect/w32_duqu_precursor next stuxnet,.
  • 8Wiki. Flame (malware)[EB/OL].http://en.wikipedia.org/wiki/Flame_(malware),.
  • 9N.Allison M,Bhimani A,Boni W. When Advanced Persistent Threats Go Mainstream[M].America:RSA,2011.
  • 10McAfee Labs,McAfee Foundstone Professional Services. Protecting Your Critical Assets[M].America:McAfee,2010.

共引文献70

同被引文献63

引证文献10

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部