透過您的圖書館登入
IP:3.129.22.135
  • 學位論文

分散式系統之防禦偵測方法設計與實作

Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention

指導教授 : 顏嗣鈞
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


在這個網路攻擊日益興盛的資訊年代,防火牆、入侵偵測系統、入侵預防系統等防禦性軟硬體產品也逐年增加,舉凡Amazon的CloudFront、Web Application Firewall著名的ModSecurity等都是類似概念下衍伸出的產品。但這些防禦性產品都容易出現安全盲點,舉例像大部分入侵偵測系統在偵測到攻擊流量特徵時,會採取阻擋IP位址的黑名單方法來防禦攻擊者,但這類方法治標不治本,並沒有真正解決系統問題,也容易使系統網管陷入自以為安全的誤區。 在本篇論文中,我們將提出一種較前人方法更佳的系統測試框架,能夠針對前面提到的黑名單機制的防禦性產品做一個全面性的檢測,期望能解決前面所提的安全盲點問題。我們透過雲端分散式的架構來將測試流量分散,其既可以混淆偵測機制,也可以躲避黑名單阻擋機制,並且對測試速度來說有顯著的提升。而此種方法,不僅可以視為資訊安全專家、公司企業一個自我檢測設備防禦程度的工具,也能給防禦性產品開發人員當作一個測試指標。 在過去的方法中,普遍是以單純規則層面上的手法去試著繞過這類安全性產品的黑名單阻擋機制。或者是以少量預先開好抑或是原本自身就擁有多台機器的條件上,去對安全性產品做單一類別的掃描、測試。這些條件對於一般小型公司或資訊安全研究員來說,並不是一個很完善的好方法,故此篇論文主要的貢獻在於:第一、提出一個自動化的開關機器方法 (Auto-scaling),第二、不僅僅局限於單一類別的掃描、測試,而是支援多種類型的常見掃描、測試方法,第三、提出一種高效率、低支出的演算法,能夠在較短時間內完成任務,降低金錢與時間成本。

關鍵字

分散式系統 安全 滲透掃描

並列摘要


In this Internet era, cyber attacks happen every second. The safety of network environments rely more and more on firewalls, intrusion prevention systems and intrusion detection systems. Noteable products include Amazon’s CloudFront and the popular Web Application Firewall product ModSecurity. These defense products usually have some security blind spots. When they detect malicious requests, they often directly block the source IP address to prevent further attacks. Such a method is not the best way for defensing cyber attack, because the attacker might be able to bypass the above defense systems. In this thesis, we will introduce a better system testing method and implement a testing framework for detecting previous blacklist bypassing problems. It will use a better scanning method to test the IP-based blacklist defense products, and this framework will automatically create lots of cloud instances to dodge the detection from Amazon EC2 or Google GCP, and so on. This method can confuse a WAF/IDS detection mechanism and it can speed up the scanning time and promote the coverage rate. In the past, researchers usually use rule-based methods to bypass a WAF/IDS detection mechanism. But when WAF/IDS rules become stronger, these methods will become useless for pentesters or researchers. As many companies do not have enough resources to build a huge testing environment to test their products, our goal is to introduce a frugal and faster method and algorithm to find vulnerabilities in their products.

並列關鍵字

Distributed System Security Scanning

參考文獻


[1] Prachi Deshpande, Aditi Aggarwal, S.C.Sharma, P.Sateesh Kumar, Ajith Abraham, “Distributed Port-Scan Attack in Cloud Environment”, 2013 Fifth International Conference on Computational Aspects of Social Networks, 12-14 Aug. 2013.
[2] Damien Riquet, Gilles Grimaud, Michaël Hauspie, “Large-Scale Coordinated attacks: Impact on the Cloud Security”, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 4-6 July 2012.
[3] Preeti Mishra, Vijay Varadharajan, Uday Tupakula, Emmanuel S. Pilli, “A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection”, IEEE Communications Surveys & Tutorials, Vol. 21, pp. 686-728, 15 June 2018.
[4] P.Deshpande, S. Sharrna, P. Kumar, “Deployment of Private Cloud: Go Through the Errors First” Proc. of Conference on Advances in Communication and Control Systems 2013 (CAC2S 2013), Deharadun-India, Apr. 2013, pp. 638-641.
[5] Mingphum Arunwan, Tanachad Laong, Kiattichai Atthayuwat, “Defensive Performance Comparison of Firewall Systems”, 2016 Management and Innovation Technology International Conference (MITicon), 12-14 Oct. 2016.

延伸閱讀