查詢結果分析
來源資料
頁籤選單縮合
| 題 名 | 網路入侵偵測的證據萃取與保留的兩階段分析方法=A Two-Phase Analysis Approach to Extracting and Preserving Relevant Evidences from NIDS Alerts |
|---|---|
| 作 者 | 林顥宗; 王勝德; | 書刊名 | 前瞻科技與管理 |
| 卷 期 | 5:1 2015.05[民104.05] |
| 頁 次 | 頁107-128 |
| 分類號 | 448.6 |
| 關鍵詞 | 入侵偵測; 攻擊防禦圖; 警示相關; 網路封包; 網路鑑識; Intrusion detection; Attack-defense graph; Alert correlation; IP packet; Network forensics; |
| 語 文 | 中文(Chinese) |
| 中文摘要 | 殭屍網路(Botnet)為目前資安防治的重點,肇因於Botnet常被用於大規模的網路攻擊,例如:DDoS、垃圾信件,故為偵測Botnet惡意程式,了解其惡意程式的行為是首要步驟。在本研究中,我們利用虛擬環境提出一個側寫以及偵測Botnet惡意程式的機制,所設計的代理程式被放置於虛擬機器監視器中,用來側寫虛擬機器中的惡意程式,其產生的側寫行為檔案經分析後,可用以檢測其他虛擬機器是否有相似的感染跡象。除以上被動觀察偵測外,本研究再提出主動式偵測方法,即藉由分析側寫行為,代理程式可以主動發出特殊的刺激事件,主動測試受測的虛擬機器是否遭受感染。我們以40隻真實世界的惡意程式為實驗樣本,並與正常的程式交叉分析,藉以精確地區分各家族的惡意程式以及正常程式。 |
| 英文摘要 | Botnet have been one of the most sophisticated and popular threats to Internet security since many cybercrimes were launched by them, i.e., DDoS, spamming. To detect the existence of a bot malware, the first step is to understand its behavior. In this research, we take the advantage of virtualized environment and propose a profiling and detection mechanism of bot malware in a virtualized environment. The proposed profiling and detection agent lies in the virtual machine monitor to profile a malware execution behavior. The output of the process is the characteristic description of the malware behavior referred to as the malware profile that is aimed to be used for effective malware detection. Besides passive malware detection, we also propose to use the obtained malware profiles to conduct active fingerprinting to detect malware hidden in unknown compromised computers. The agent sends specific stimulus to a targeted virtual machine to examine whether any expected triggerable behavior are observed. We use 40 real-world malware samples and several benign programs to show that our profiling and detection mechanisms can correctly distinguish bots and benign software with low false alarm. |
本系統中英文摘要資訊取自各篇刊載內容。