期刊文献+

一种基于沙箱技术的网页挂马检测系统

A Sandboxing-based Detection System for Webpage Trojan
下载PDF
导出
摘要 随着互联网的迅猛发展,网页已经成为人们日常发布和获取信息的重要途径,给人们带来了极大的便利。然而,安全挑战也随之而来,层出不穷的网页入侵手段严重影响着互联网的长远应用和发展,尤其是网页挂马是一个十分泛滥的攻击方式,严重威胁着用户安全。针对此问题,本文提出了一种基于沙箱技术的检测系统,能够动态地检测和抵御网页木马攻击。在安全性上,所提系统通过高交互蜜罐中多个沙箱技术,动态地模拟网页木马攻击过程,进而能够分析和抵御应用层、系统层和内核层的恶意行为,实现了多层检测。在效率上,所提系统采用了轻量级的沙箱技术,在内核层涉及较少调用,着重在应用层HOOK相关API实现检测,提高了效率表现。实验评估分析表明,所提系统能够获得较好的性能。 With the rapid development of the Internet,webpage has become an important way to make people get daily information,which brings great convenience.However,security issues are becoming challenging.Kinds of webpage intrusion have affected the network and terminal securities. Especially,webpage trojan is well known as an effective attack way.This paper proposes a new detection system based on sandbox technologies to dynamically detect webpage trojan.For the security,by employing multi-sandbox technologies in the high-interaction honeypot,the proposed system can simulate the attack process of Webpage Trojan.Then,malicious behaviors can be analyzed and detected at the application layer,the system layer and the kernel layer, which realizes multi level detection.For the efficiency,the proposed system uses a lightweight technology to focus on the HOOK operations at the application layer,which can avoid the time-consuming operations at the kernel layer. The experimental evaluation results show that comparing with the existing schemes,the proposed system can achieve better performance.
出处 《电子测试》 2014年第11X期87-92,共6页 Electronic Test
基金 信息网络边界安全隔离及主动防御技术研究及应用EPRIXXKJ[2013]2868
关键词 网页木马 蜜罐 沙箱 动态检测 Webpage Trojan Honeypot Sandboxing Dynamic Behavior
  • 相关文献

参考文献17

  • 1Greg Hoglund,Jamie Butler.Rootkits:Subverting the Windows Kernel. Journal of Women s Health . 2005
  • 2Wei Li,Lap chung Lam,Tzi cker Chiueh.Application Specific Sandboxing for Win32/Intel Binaries. First Program Analysis for Security and Safety Workshop Discussion (PASSWORD 2006) . 2006
  • 3张林,曾庆凯.软件安全漏洞的静态检测技术[J].计算机工程,2008,34(12):157-159. 被引量:41
  • 4Alexandrov A,Kiniee P,Schauser K.Consh: A confined execution environmentfor internet computation. http://www.cs.ucsb.edu/berto/papers/99-usenix-consh.ps . 1998
  • 5李时惠.一种增强的基于威胁度的沙箱框架设计[J].计算技术与自动化,2006,25(3):123-126. 被引量:3
  • 6Rutu Karia.Honeypot with Honeypot Management System for web applications. Journal of Women s Health . 2011
  • 7张迎春.基于特征码技术的攻防策略[J].计算机系统应用,2009,18(3):114-117. 被引量:4
  • 8Acharya A,Raje M.MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. 9th USENIX Security Symposium . 2000
  • 9N. Provos.Improving Host Security with System Call Policies. 12th Usenix Security Symposium . 2003
  • 10Peterson D S,Bishop M,Pandey R.A flexible con tainment mechanism for executing untrusted code. Proc.1lth USEN IX Security Symposium . 2002

二级参考文献43

  • 1张森强,郭兴阳,唐朝京.检测多态计算机病毒的数学模型[J].计算机工程,2004,30(17):24-25. 被引量:6
  • 2李焕洲,张健,陈麟.一种基于敏感信息跟踪的网络取证技术的研究[J].四川师范大学学报(自然科学版),2005,28(6):759-762. 被引量:2
  • 3陈伟,孙勇,杨义先,钮心忻.面向特征的信息隐藏检测研究[J].计算机系统应用,2006,15(3):32-35. 被引量:2
  • 4王振海,王海峰.针对多态病毒的反病毒检测引擎的研究[J].微计算机信息,2006,22(09X):134-136. 被引量:9
  • 5夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:29
  • 6Kreibich C, Honeycomb CJ. Creating Intrusion Detection Signatures Communication Review, Using Honeypots.Computer 2004,1:51 - 56.
  • 7国家计算机网络应急技术处理协调中心.CNCERT/CC2007年网络安全工作报告[EB/OL].http ://www. cert. org. cn/UserFiles/File/CNCERTCC2007 AnnualReport_Chinese. pdf,2007-08-21.
  • 8Fiskiran A M, Lee R B. Runtime execution monitoring (REM) to detect and prevent malicious code execution[ C]//Proceedings of the IEEE International Conference on Computer Design. Washington,DC, USA:IEEE Computer Society,2004:452-457.
  • 9Deng P S, Wang J H, Shieh W G, et al. Intelligent automatic malicious code signatures extraction [ C ]//Proceedings of IEEE 37th Annual 2003 International Carnahan Conference on Security Technology. Washington, DC, USA: IEEE Computer Society, 2003 : 600-603.
  • 10Schultz M G, Eskin E, Zadok E, et al. Data mining methods for detection of new malicious executables[ C]//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Washington, DC, USA : IEEE Computer Society,2001:38.

共引文献337

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部