透過您的圖書館登入
IP:13.58.173.156
  • 學位論文

P2P Bots 之行為模擬

Behavior Emulation of P2P Bots

指導教授 : 田筱榮

摘要


殭屍網路是網路世界主要的安全威脅之一。近年來,殭屍網路不斷的演化,從集中式控制的的IRC殭屍網路、HTTP殭屍網路演化至非集中式控制的P2P殭屍網路,使得既有的偵測或防禦方法無法有效地阻擋P2P殭屍網路,因此需要發展適用的新方法,而在發展的過程中,合宜的測試環境不可或缺。直接使用真實的殭屍病毒參與殭屍網路的難處包括:P2P殭屍病毒樣本不易取得,取得的P2P殭屍病毒樣本常不再能與殭屍網路完成連接並進行運作,而可運作的P2P殭屍病毒具有高度的安全風險。因此在本研究中,我們提出使用行為模擬環境支持P2P殭屍網路偵測與防禦機制的發展,並開發了P2P殭屍網路的模擬環境,根據文獻中所記載的P2P殭屍網路病毒在主機上的行為以及網路上的封包流量進行模擬。此P2P殭屍病毒模擬環境可依照使用者的需求,輸入各項參數,來模擬出各種可能的殭屍病毒封包流量,提供各種偵測與防禦殭屍病毒機制作為有效性測試的資料。

並列摘要


Botnet is one of the major threats to the cyberworld. In recent years, the operation model of botnet has evolved from the centralized IRC or HTTP botnets to the decentralized P2P botnet. The existing botnet detection or defense mechanisms based on the centralized operation model are not effective in deterring the threats resulted from P2P botnet, thus, new detection or defense mechanism is in need, and an experiment environment for testing is indispensable. There are several major issues pertaining to the establishment of such environment with real botnet malware in the wild: the accessibility to the malwares, the operability of obtained malwares, and the security risk that may come with them. Therefore, in stead of employing real botnet malwares, an emulated test environment is proposed and implemented in this thesis. Its design is based on the P2P botnet operation characteristics described in literature. With properly supplied configuration parameter settings, the emulated environment can facilitate the needed testing in developing detection or defense mechanisms for P2P botnet.

參考文獻


[13] 劉邦威,“P2P殭屍網路之適應性防禦機制”,中原大學研究所,碩士論文,中華民國九十八年一月。
[3] Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose and Andreas Terzis, “A Multifaceted Approach to Understanding the Botnet Phenomenon,”In IMC’06, October 25-27, 2006, Rio de Janeiro, Brazil
[4] Hyunsang Choi, Hanwoo Lee, Heejo Lee and Hyogon Kim, ” Botnet Detection by Monitoring Group Activities in DNS Traffic,” in Proc. 7th IEEE International Conference on Computer and Information Technology, 2007, pp. 715–720.
[7] Yuji KUGISAKI, Yoshiaki KASAHARA, Yoshiaki HORI, and Kouichi SAKURAI,“Bot Detection Based on Traffic Analysis”, Intelligent Pervasive Computing,2007.IPC., IEEE Press, October 11, 2007, http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4438445&isnumber=4438371.
[8] Iván Arce and Elias Levy, “An analysis of the slapper worm”, IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 82–87, 2003

被引用紀錄


陳彥甫(2012)。殭屍網路測試自動化環境架設與實驗執行〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201201014
劉耕瑋(2010)。P2P Bots 之適應性防禦機制〔碩士論文,中原大學〕。華藝線上圖書館。https://doi.org/10.6840/cycu201001068

延伸閱讀


國際替代計量