簡易檢索 / 詳目顯示

研究生: 李崇誠
Lee, Chung-Cheng
論文名稱: 多設備關連演算法在大型安全分析平台
Multi-Devices Correlation Algorithm in Large Scale Security Analysis Platform
指導教授: 黃悅民
Huang, Yueh-Min
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2009
畢業學年度: 97
語文別: 中文
論文頁數: 61
中文關鍵詞: 偵測多設備日誌
外文關鍵詞: Log Correlation, Malware Attack Detection
相關次數: 點閱:89下載:1
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今的IDS架構,主要以Signature技術為主,透過攻擊特徵比對技術來偵測攻擊行為。但此技術存在一些問題,如無法偵測新型攻擊與未知攻擊。因而有專家學者,提出以智慧型方法為基礎的Anomaly技術來改善此議題,但這些技術常衍生因正常行為模式不易界定,而容易產生誤判。
    本文提出以多設備為基礎的三種關連演算法來加強單純以Signature Based 之IDS之網路安全防護,藉此解決無法偵測新型攻擊與未知攻擊的問題。第一種為IDS與Proxy[1]為基礎之演算主要可分為IDS-Proxy Correlation1(IPC1)關連演算法,可用在撰寫惡意攻擊特徵之規則參考依據。第二種IDS-Proxy Correlation2 (IPC2)關連演算法,則可應用於驗證企業級安全政策之正確性。第二種以IDS與Firewall為基礎之演算法,可用於追蹤可疑攻擊事件的來源資訊和驗證Firewall Policy,第三種則是以IDS與Router為基礎之演算法,可用於查詢可疑攻擊事件的IP位址和確認Router ACL。
    本文最後規劃測試場景來加以驗證我們所提出的系統架構和演算法,在IDS-Proxy關連部份,透過惡意網站測試結果可呈現偵測惡意網站的正確性。另外藉由多型變種攻擊、後門與木馬程式、郵件伺服器攻擊測試則可呈現IDS-Firewall關連針對攻擊事件資訊的參考性,最後透過網頁伺服器攻擊測試,可呈現IDS-Router關連針對攻擊來源追蹤的可用性,本文顯示出這些演算法可適用於大型安全分析平台的有效性。

    Current IDS is based on signature matching technique. However signature technique can not detect novel and unknown attack, if it lacks corresponding attack signatures. Many anomaly techniques based on intelligent method are then proposed to tackle with it. Unfortunately these anomaly detection algorithms are still suffered from large false positives, because the normal profiles are difficult to define.

    We propose three multi-devices correlation algorithms to improve the security of enterprise with a signature based IDS deployed. The first one IDS-Proxy Correlation 1 (IPC1) algorithm, which correlate the IDS alert logs from proxy server more informations for experts. Another IDS-Proxy Correlation having IPC2 algorithm is proposed to verify the effectiveness and correctness of enterprise security policy. The second algorithm based on IDS-firewall correlation can trace source on network security incident and verify correctness of firewall policy. The IDS-Router correlation is our third proposed algorithm which aims at correctness of router’s ACL (Access Control List).

    Our test results demonstrate some of malicious web sites focus by IDS-Proxy correlation algorithm. Our tests based on polymorphic, backdoor, Trojan, E-mail server and Web Server attack which do show some useful by IDS-Firewall and IDS Router correlation. From these experiments, we believed that three there algorithms can be applied to large scale security analysis platform.

    第1章 緒論 1 1.1. 研究背景 1 1.2. 研究動機 1 1.3. 論文架構 2 第2章 文獻探討與相關工作 3 2.1. 網路攻擊行為分析 3 2.2. 入侵偵測技術 4 2.2.1. 誤用偵測(Misuse Detection) 5 2.2.2. 異常偵測(Anomaly Detection) 5 2.3. 關連技術 6 2.3.1. 日誌分析應用探討(Log Analysis) 6 2.3.2. 關連方法探討(Correlation Approaches) 8 第3章 系統設計與實作 12 3.1. 系統架構 12 3.2. 日誌收集機制與日誌格式 21 3.3. 系統實作 33 第4章 多設備關連演算法 35 4.1. IDS-Proxy關連演算法 35 4.2. IDS-Firewall關連演算法 38 4.3. IDS-Router關連演算法 39 第5章 實驗與測試 41 5.1. 測試環境規劃 41 5.2. 測試場景規劃與測試結果 44 第6章 結論 59 參考文獻 60

    [1]曾龍, 李崇誠, 黃培軒, 鄭郁翰, 黃悅民 "Detection of Malware Attack via IDS Proxy Correlation Algorithm", U-Home Conference 2008
    [2]賽門鐵克網路安全威脅研究報告,2008/04
    [3]A. Valdes and K. Skinner. Probabilistic Alert Correlation. In Recent Advances in Intrusion Detection. Volume 2212 of Lecture Notes in Computer Science, Springer-Verlag, 2001.
    [4]Bro, http://bro-ids.org/
    [5]C. Abad, J. Taylor, C. Sengul, Y. Zhou, W. Yurcik, and K. Rowe. Log Correlation for Intrusion Detection: A Proof of Concept. In Proc. of the 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, December 2003.
    [6]D. Andersson, M. Fong, and A. Valdes. Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis. Presented at IEEE Information Assurance Workshop, June 2002.
    [7]F. Cuppens and A. Miege. Alert Correlation in a Cooperative Intrusion Detection Framework. In IEEE Symposium on Security and Privacy, May 2002.
    [8]Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee, "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation", in Proceedings of the 16th USENIX Security Symposium, August 2007.
    [9]Iptables,http://www.netfilter.org/
    [10]RFC3164 - The BSD Syslog Protocol
    [11]Snort, http://www.snort.org/
    [12]Squid,http://www.squid-cache.org/
    [13]X. Qin and W. Lee. Statistical Causality Analysis of INFOSEC Alert Data. In Recent Advances in Intrusion Detection, September 2002.
    [14]Yinglian Xie, "A Spatiotemporal Event Correlation Approach to Computer Security" Thesis of Ph.D. August 2005
    [15]Yousof Al-Hammadi and Uwe Aickelin, "Detecting Botnets Through Log Correlation", IEEE / IST Workshop on "Monitoring, Attack Detection and Mitigation" Thursday 28 / Friday 29 September, 2006.
    [16]Yousof Al-Hammadi, Uwe Aickelin, “Detecting Bots Based on Keylogging Activities”, 3rd International Conference on Availability, Reliability and Security (ARES2008)

    下載圖示 校內:2014-07-31公開
    校外:2014-07-31公開
    QR CODE