| 研究生: |
游建宏 CHIEN-HUNG YU |
|---|---|
| 論文名稱: |
基於網路行為關連性偵測IRC僵屍網路之研究與實作 |
| 指導教授: |
吳中實
Wu, Jung-Shyr |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 通訊工程學系在職專班 Executive Master of Communication Engineering |
| 畢業學年度: | 98 |
| 語文別: | 中文 |
| 論文頁數: | 89 |
| 中文關鍵詞: | 網路行為 、偵測方法 、僵屍網路 |
| 外文關鍵詞: | the method of the Botnet detection, Network behavior, Botnet |
| 相關次數: | 點閱:12 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網際網路的蓬勃發展,以Botnet為主的網路犯罪及攻擊活動以逐漸成為網路資訊安全上的重大議題。Botnet可以是木馬程式、後門及蠕蟲等三種惡意程式的其中一種型態,或結合三種惡意行為出現的一種新型態的攻擊活動,因此並不容易被偵測。在研究相關偵測的方法上,目前都有其本身偵測方法的優點與缺點。
為了能夠有效的偵測出Botnet,本論文以實作架設仿真網路環境。同時藉由實際的活動行為,將Botnet的生命週期分為四個階段來模擬並觀察活動的行為模式。並使用以網路行為關聯性的分析方法,來偵測區域網路內Botnet活動的網路行為特徵。從研究上我們發現病毒本身的特徵容易變化,但病毒的網路活動行為特徵卻不容易改變,也就是說即使特徵改變了但行為特徵並未隨特徵碼改變。因此本論文使用網路行為關聯性來分析出Botnet行為特徵,同時採用本論文所設計的偵測機制來偵測區域網路內的Botnet活動。
Along with the flourishing development of Internet, many network crimes and malicious attacking activities base on Botnet become a major issue in network security. The Botnet can be either one of backdoors, Trojan horses, and worms or a new form of malicious code that combines those three types. Therefore, it is hard to be detected. The existing researches of detecting method have their own advantages and disadvantages.
In order to detect Botnet effectively, we build up an emulable network environment to observe real Botnet activities, and divide the life cycle of Botnet into four different stages to simulate and observe behaviors of its activities. In the same time, we use the correlation of network behavior to detect Botnet activities and their characteristics in LAN network. Eventfully, we found that even the binary code of bot is changed easily, the characteristics of its network behavior is not easy to change. In other words, the change of characteristics doesn’t always come along with the change of bot code. In this research, we analyze the characteristic of Botnet by using correlation of network behavior and using the detection scheme we designed to detect the Botnet activities in LAN network.
[1] Nicole Immorlica, Kamal Jain, Mohammad Mahdian, and Kunal Talwar,“Click Fraud Resistant Methods for Learning Click-Through Rates.”Lecture Notes In Computer Science. Springer-Verlag,New York, 34–45
[2] Evan Cooke, Farnam Jahanian, Danny McPherson,“The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.”In Usenix Workshop on Steps to Reducing Unwanted Traffic on the Internet , June 2005
[3] J Oikarinen, and D Reed,“Internet relay chat protocol.” RFC 1459, 1993
[4] Damballa, http://www.damballa.com/
[5] http://en.wikipedia.org/wiki/Botnet
[6] Bailey M, Cooke E, Jahanian F, Yunjing Xu, Karir M, “A Survey of Botnet Technology and Defenses.” 3-4 MIRCh 2009, Page(s):299 - 304
[7] http://www.runpc.com.tw/content/main_content.aspx?mgo=185&fid=G03
[8] Zhaosheng Zhu, Guohan Lu, Yan Chen, Zhi Judy Fu,Phil Reberts, and Keesook Han,“Botnet Research Survey. ” 2008 32nd Annual IEEE International Computer Software and Applications Conference
[9] Guofei Gu, Junjie Zhang, and Wenke Lee,“BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.”Security Conference 2008
[10] Kugisaki Y, Kasahara Y, Hori Y, Sakurai K,“Bot Detection Based on Traffic Analysis.”11-13 Oc. 2007, Page(s):303–306
[11] Shahrestani A, Ramadass S, Feily M,“A survey of Botnet and Botnetm Detection.”18-23 June 2009, Page(s):268 -273
[12] The Honeynet Project, http://www.honeynet.org/
[13] Basil AsSadhan, José M F, Moura, David Lapsley, Christine Jones, and W Timothy Strayer,“Detecting Botnets using Command and Control Traffic.”
[14] Wang Ping, Wang Jung-hsiang, Su Hao-Yi, Yen Po-Chang, Kuo Pu-Tsn,“僵屍網路的感染途徑重建與分析.”TANET 2008 臺灣網際網路研討會, Oc. 2008
[15] Mazzariello C,“IRC Traffic Analysis for Botnet Detection.”8-10 Sept. 2008, Page(s):318 – 323
[16] The IDS Snort,URL,
http://www.snort.org/dl/binaries/win32/
[17] Katsumi Ono,Isamu Kawaishi,Toshihiko Kamon,“Trend of Botnet Activities.”2007
[18] The NAGIOS Project, http://www.nagios.org/
[19] Carl Livadas, Bob Walsh, David Lapsley and Tim Strayer,“Using Machine Learning Techniques to Identify Botnet Traffic,”In 2nd IEEE LCN Workshop on Network Security (WoNS''2006), 2006