| 研究生: |
彭士家 Shi-Jia Peng |
|---|---|
| 論文名稱: |
使用Openflow 交換器偵測Botnet 受害者與通知機制 Botnet Victim Detection and Notification based on Openflow Switch |
| 指導教授: |
曾黎明
Li-Ming Tseng |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 畢業學年度: | 98 |
| 語文別: | 中文 |
| 論文頁數: | 57 |
| 中文關鍵詞: | Openflow 、封包轉向 、NetFPGA 、殭屍網路 |
| 外文關鍵詞: | Botnet, Openflow, redirect, NetFPGA |
| 相關次數: | 點閱:6 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著網路不斷的發展,網路上的資料越來越重要,網路交易也越來越頻繁。
同時網路犯罪開始興起,而殭屍網路(botnet)就是其中一種。殭屍網路有攻擊
者隱密、且彈性大的特性,而且能夠一次對多台電腦進行控制。
本篇論文以IRC 協定的botnet 為研究對象,首先說明botnet 的運作機制,
和botnet 對於資安人員難以解決的問題。接著介紹由史丹佛大學開發的NetFPGA
網卡和openflow 計劃的特色及優點,並說明用linux gateway 來阻擋的效率問題。
本篇論文透過史丹佛大學設計的NetFPGA 和openflow 網路,設計了一套可以使
用openflow switch 來偵測已中毒的電腦。我們假設正常使用者皆會瀏覽網頁,
利用openflow switch 將中毒的電腦導向至一個警告頁面,告知使用者中毒資訊,
再透過網路的封鎖策略,讓使用者了解解決中毒情況的必要性和急迫性。
Over the years, the network developed quickly and constantly. Because the rise
of trade networks, data on the network become more and more important.
Unfortunately, the rise of internet crime became a big problem at the same time such
as Botnet. Botnet have hidden attackers, and the characteristics of high flexibility, but
also an ability to control multiple computers.
This paper describes the IRC-based botnet. First, we explain the botnet behavior
and the hard to solve problems for security officer. Then we introduced the NetFPGA
card developed by the Stanford University and explained the openflow project
features and advantages. These devices are used as a linux gateway to be an efficient
firewall. This paper use the NetFPGA card and openflow network project designed by
Stanford University to detect bot in the botnet. Assume that normal users browser web
everyday, we use openflow switch redirect the bot traffic to a particular page that
show the warning information. Then through the network disconnected strategy, we
try to let the user know the necessity and urgency.
[1] Chao Li, et. al.,”Botnet: Survey and Case Study”, 2009 Fourth International
Conference on Innovative Computing, Information and Control, Kaohsiung,
Taiwan, pp.1184-1187
[2] C. Kalt, “Internet Relay Chat: Architecture.” RFC 2810, 2000
[3] http://www.openflowswitch.org/foswiki/bin/view/OpenFlow/Deployment/H
OWTO/LabSetup
[4] https://uncia.cc.ncu.edu.tw/dormnet/
[5] Nick McKeown, et. al. , “Prototyping Fast, Simple, Secure Switches for
Ethane”, 15th IEEE Symposium on High-Performance Interconnects 2007,
pp.73 - 82
[6] Nick McKeown, et. al., “Openflow : Enabling Innovation in Campus
Networks”, Openflow White Paper March 14, 2008
[7] Nick McKeown, et. al. “Implementing an OpenFlow Switch on the
NetFPGA platform” ANCS ’08, November 6–7, 2008, San Jose, CA, USA
[8] 郭廖軒,“以網域名稱伺服器為基礎之色情網站過濾系統“,國立中央大
學資訊工程學系碩士論文,民92
[9] Paul Barford, et. al. “An Inside Look at Botnets”, Computer Sciences
Department University of Wisconsin, Madison, 2007
[10] Dae-il Jang, et. al. “Analysis of HTTP2P Botnet: Case Study Waledac”,
Proceedings of the 2009 IEEE 9th Malaysia International Conference on
Communications 15-17 December 2009 Kuala Lumpur Malaysia,
pp.409-412
[11] David Dagon, et. al. ,”A Taxonomy of Botnet Structures”, 23rd Annual
Computer Security Applications Conference, pp.325-339
[12] http://www.malwaredomains.com/
[13] Cliff C. Zou, et. al. ,”Honeypot-Aware Advanced Botnet Construction and
Maintenance”, Proceedings of the 2006 International Conference on
Dependable Systems and Networks(DSN’06),pp.199-208
[14] Kazuya Kuwabara, et. al. ,”Heuristics for Detecting Botnet Coordinated
Attacks”, 2010 International Conference on Availability, Reliability and
Security,pp.603-607
[15] Jose Nazario, et. al.,”As the Net Churns: Fast-Flux Botnet Observations”,
2008 3rd International Conference on Malicious and Unwanted
Software(MALWARE) at the Hilton Alexandria Mark Center, Fairfax,
Virginia ,pp. 24-31
[16] Cliff C. Zou, Ryan Cunningham, “Honeypot-Aware Advanced Botnet
Construction and Maintenance” 2006 International Conference on
Dependable Systems and Networks,pp. 199-208
[17] OpenFlow Switch Specification Version 0.8.9(Wire Protocol 0x97)
December 2, 2008
[18] Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose and Andreas Terzis, ”A
Multifaceted Approach to Understanding the Botnet Phenomenon”, In
IMC’06, October 25–27, 2006, Rio de Janeiro, Brazil
[19] 陳天豪,“透過封包分析偵測並瓦解殭屍網路”,國立中央大學資訊工程
學系碩士論文,民98
[20] Trends for 2009 “Symantec Global Internet Security Threat Report” 網路安
全威脅研究報告Published April 2010