簡易檢索 / 詳目顯示

研究生: 李俊皜
Li, Jyun-Hao
論文名稱: 重現殭屍網路感染拓樸之研究
The Study on Botnet Topology Reconstruction
指導教授: 楊竹星
Yang, Chu-Sing
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 電腦與通信工程研究所
Institute of Computer & Communication Engineering
論文出版年: 2011
畢業學年度: 99
語文別: 中文
論文頁數: 66
中文關鍵詞: 殭屍網路感染拓樸攻擊情境Testbed
外文關鍵詞: Botnet, Attack Scenario, Testbed
相關次數: 點閱:173下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近十年來,殭屍網路所發動的攻擊事件嚴重影響了網路世界和現實社會。殭屍網路控制者會對已感染殭屍病毒的網路主機進行鍵盤側錄、私密資料竊取、安裝廣告軟體,或者利用殭屍主機來散佈垃圾郵件、釣魚郵件、點擊詐欺等網路攻擊,也可下指令讓殭屍網路發動分散式阻斷服務攻擊。

    較早期的殭屍網路是以IRC協定作為溝通管道,後來為了躲避防火牆,改成使用HTTP協定進行連絡;最後為了強化IRC協定和HTTP協定等集中式網路架構的弱點,進而發展成強健的P2P殭屍網路;近期社群網站興起,駭客也已將惡意程式改寫成以Facebook或Twitter為溝通基礎的殭屍程式。由前述可知,殭屍網路躲避偵測、入侵主機及網路攻擊技術近趨完整,會隨著常用的網路協定或應用而有不同的變化,更加的難以偵測,讓網路使用者容易遭受攻擊。

    為了防禦殭屍網路的攻擊,首先必須全面性的了解殭屍網路的感染路徑與攻擊方式,經由不同的殭屍網路攻擊觀察弱點並進行阻擋。本研究在Testbed@TWISC平台上仿真重現殭屍網路控制者透過C&C伺服器控制受殭屍程式感染主機的情境,觀察和分析殭屍網路感染週期;並且在網路設備上建立防禦工具,偵測殭屍網路所傳送的攻擊封包;最後會將收集到的各種攻擊的封包進行分析與整合,並且還原殭屍網路的感染與攻擊情境。

    Over the past decade, Botnet has been a serious threat in Internet. The Botmaster can make bots launch a number of attacks, such as key logger, private information stealing, spam mail, phishing, click fraud and DDoS attack.

    In earlier, bots communicated with each other by IRC protocol, and in order to bypass the firewall, changed to use the HTTP protocol. Now they form a robust P2P Botnet to make stronger and put right the weaknesses. Social networks have developed dramatically in recent, and hackers can transform malwares into Facebook-based or Twitter-based bot programs. Due to the mature technology, it becomes more and more difficult to detect Botnet, which makes network users vulnerable from Botnet attacks.

    To defend the attacks of Botnet, it is necessary to make an overall understanding in infection paths and attack methods of Botnet. This paper rebuilds a scenario in Testbed@TWISC that the Botmaster controls the bots by the C&C Server, analyzes the infection period of Botnet, deploys defense tools in network devices to detect attacks launched by Botnet, and the last makes integration and analysis of collected attacking packets.

    目錄 摘要 III Abstract IV 誌謝 V 表目錄 IX 圖目錄 X 第一章 緒論 1 1.1 研究背景 1 1.2 研究動機與目的 1 1.3 論文架構 2 第二章 相關研究 3 2.1 殭屍網路 (Botnet)常用網路協定 3 2.1.1 Internet Relay Chat (IRC) 3 2.1.2 Peer to Peer (P2P) 4 2.1.3 Hypertext Transfer Protocol (HTTP) 8 2.2 殭屍網路介紹 11 2.2.1 IRC Botnet 11 2.2.2 P2P Botnet 12 2.2.3 HTTP Botnet 12 2.2.4 殭屍網路拓樸 12 2.2.5 殭屍網路感染週期 15 2.3 殭屍網路偵測技術 21 2.3.1 主機端的偵測 22 2.3.2 網路端的偵測 23 2.4 資訊安全實驗平台 24 2.4.1 資訊安全實驗平台特性 24 2.4.2 Testbed@TWISC 26 2.5 封包辨識技術 26 2.5.1 封包擷取 26 2.5.2 封包辨識 26 第三章 殭屍網路攻擊封包特徵擷取 28 3.1 IRC Botnet網路流量特徵擷取 – 以SDBot為例 28 3.1.1 SDBot攻擊流量情境特徵分析 28 3.1.2 取得SDBot攻擊封包特徵字串 36 3.2 HTTP Botnet網路流量特徵擷取 – 以BlackSun為例 37 3.2.1 BlackSun攻擊流量情境分析 37 3.2.2 取得BlackSun攻擊封包特徵字串 42 第四章 系統架構設計與實作 46 4.1 系統架構設計 46 4.2 系統實作 47 4.2.1 系統環境 47 4.2.2 封包擷取模組 47 4.2.3 封包辨識模組 48 4.2.4 封包儲存模組 49 4.2.5 封包分析模組 50 4.2.6 呈現攻擊情境拓樸 54 第五章 實驗和結果呈現 55 5.1 SDBot感染及攻擊情境拓樸重現 55 5.2 BlackSun感染及攻擊情境拓樸重現 57 5.3 SDBot和BlackSun在網路中交叉感染情境拓樸重現 59 第六章 結論與未來工作 63 參考文獻 64

    [1] Ago wiki, http://en.wikipedia.org/wiki/Agobot.
    [2] An introduction to data mining, http://www.thearling.com/text/dmwhite/dmwhite.htm.
    [3] Appserv Open Project, http://www.appservnetwork.com/.
    [4] BitTorrent (protocol) wiki, http://en.wikipedia.org/wiki/BitTorrent_(protocol).
    [5] Botnet wiki, http://en.wikipedia.org/wiki/Botnet.
    [6] Brandon Wiley, “Distributed Hash Tables,” http://www.linuxjournal.com/article/6797, 01 Oct 2003.
    [7] BSD, http://www.bsd.org/.
    [8] Cisco IOS NetFlow, http://www.cisco.com/web/go/netflow.
    [9] CWSandbox, http://mwanalysis.org/.
    [10] Domain names - implementation and specification, http://www.faqs.org/rfcs/rfc1035.html.
    [11] Emulab, http://www.emulab.net/.
    [12] FREEnet, http://www.freenet.com/.
    [13] Gnutella wiki, http://en.wikipedia.org/wiki/Gnutella.
    [14] Gunter Ollmann, VP of Research, Damballa, Inc., “Botnet Communication Topologies,” 4 June 2009.
    [15] Hypertext Transfer Protocol, http://www.ietf.org/rfc/rfc2616.txt.
    [16] IANA, “IANA port number list,” http://www.iana.org/assignments/port-numbers.
    [17] Internet Relay Chat Protocol, http://www.faqs.org/rfcs/rfc1459.html.
    [18] Internet Relay Chat: Architecture, http://www.faqs.org/rfcs/rfc2810.html.
    [19] Internet Relay Chat: Channel Management, http://www.faqs.org/rfcs/rfc2811.html.
    [20] Internet Relay Chat: Client Protocol, http://tools.ietf.org/html/rfc2812.
    [21] Internet Relay Chat: Server Protocol, http://www.faqs.org/rfcs/rfc2813.html.
    [22] Jeremy Reimer, “FBI: Over one million computers working for botnets,” http://arstechnica.com/security/news/2007/06/fbi-over-one-million-computers-working-for-botnets.ars.
    [23] Kaspersky Labs blog, “TDL4 – Top Bot,” http://www.securelist.com/en/analysis/204792180/TDL4_Top_Bot, 27 Jun 2011.
    [24] Kazaa, http://www.kazaa.com/#.
    [25] Maryam Feily, Alireza Shahrestani and Sureswaran Ramadass, “A Survey of Botnet and Botnet Detection,“ Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
    [26] Peer-to-Peer (P2P) Architecture, http://tools.ietf.org/html/rfc5694.
    [27] S. MccCanne, V. Jacobson, “The BSD Packet Filter:A New Architecture for User-level Packet Capture,” 1993 Winter USENIX conference, Jan 1993.
    [28] Shadowserver Home page, http://www.shadowserver.org/wiki/.
    [29] Simeon, “Introduction of Botnet,” http://simeon.blog.51cto.com/18680/24553.
    [30] State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs), http://tools.ietf.org/html/rfc5128.
    [31] Symantec, “Internet Security Threat Report, Volume 16,” http://www.symantec.com/business/threatreport/index.jsp#.
    [32] TCPDUMP&LiBPCAP, http://www.tcpdump.org/.
    [33] Tcpreplay, http://tcpreplay.synfin.net/.
    [34] Testbed@TWISC - Network Emulation Testbed Home, http://testbed.ncku.edu.tw/index.php3.
    [35] VirusTotal, http://www.virustotal.com/.
    [36] WASTE wiki, http://en.wikipedia.org/wiki/WASTE.
    [37] XAMPP, http://www.apachefriends.org/zh_tw/xampp.html.
    [38] Yoram Kulbak and Danny Bickson, “The eMule Protocol Specification,” January 17, 2005.
    [39] Yu Yao, Yong Li, Fu-xiang Gao, Ge Yu, “A Signature-behavior-based P2P worm detection approach,” Ninth International Conference on Hybrid Intelligent Systems, 2009.
    [40] SandBox 沙盒原理, http://norman.bestpc.tw/%E7%94%A2%E5%93%81%E4%BB%8B%E7%B4%B9/normans-sandbox-technology%E6%B2%99%E7%9B%92%E5%8E%9F%E7%90%86.
    [41] 陳培德,” 網路安全測試平台簡介”, http://tnrc.ncku.edu.tw/course/93/930401.pdf。
    [42] 楊竹星、李俊皜、廖明沂、羅孟彥,"基於感染週期之IRC Bot 偵測研究",電子通訊與應用研討會,2011。

    無法下載圖示 校內:2013-08-30公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE