浏览全部资源
扫码关注微信
1. 国网浙江省电力有限公司,浙江 杭州 310027
2. 国网浙江省电力有限公司电力科学研究院,浙江 杭州 310027
3. 浙江大学,浙江 杭州 310058
4. 嘉兴职业技术学院,浙江 嘉兴 314036
[ "陈利跃(1973- ),男,国网浙江省电力有限公司处长、高级工程师,主要研究方向为信息安全管理" ]
[ "孙歆(1981- ),男,国网浙江省电力有限公司电力科学研究院高级工程师,主要研究方向为新型网络安全攻防" ]
[ "成天晟(1995- ),男,浙江大学硕士生,主要研究方向为网络空间安全" ]
[ "吴春明(1967- ),男,浙江大学教授、博士生导师,主要研究方向为人工智能、柔性可重构网络体系、软件定义网络、网络主动防御创新安全技术等" ]
[ "陈双喜(1980- ),男,嘉兴职业技术学院讲师,浙江大学博士生,主要研究方向为网络空间安全的渗透与主动防御" ]
网络出版日期:2020-05,
纸质出版日期:2020-05-20
移动端阅览
陈利跃, 孙歆, 成天晟, 等. 面向Web隐藏后门技术的防御[J]. 电信科学, 2020,36(5):39-46.
Liyue CHEN, Xin SUN, Tiansheng CHENG, et al. Defense of hidden backdoor technology for Web[J]. Telecommunications science, 2020, 36(5): 39-46.
陈利跃, 孙歆, 成天晟, 等. 面向Web隐藏后门技术的防御[J]. 电信科学, 2020,36(5):39-46. DOI: 10.11959/j.issn.1000-0801.2020142.
Liyue CHEN, Xin SUN, Tiansheng CHENG, et al. Defense of hidden backdoor technology for Web[J]. Telecommunications science, 2020, 36(5): 39-46. DOI: 10.11959/j.issn.1000-0801.2020142.
Rootkit是一种持久且隐匿的攻击技术,通过修改操作系统软件或内核,更改指令执行路径,隐匿攻击行为和后门程序痕迹。首先介绍了Rootkit的基本定义及其演变过程,其次讨论了目前Rootkit工作原理、主流技术以及检测方法。然后通过安全性与性能对比实验,阐述了基于动态异构冗余架构搭建的拟态Web防御系统在木马攻击下的应用效果。实验结果表明,拟态Web防御系统能在较小开销的情况下有效地对木马攻击进行防御。最后总结了该系统在当前环境下所面临的机遇与挑战。
Rootkit is a set of persistent and undetectable attack technologies
which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly
the basic definition and evolution of Rootkit were introduced
then the operating principle
current mainstream technology and detection methods of Rootkit were discussed.Then
through comparative experiments on performance and security
the application of mimic defense system was described for Web based on dynamic
heterogeneous
redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last
the opportunities and challenges of the DHR system were summarized.
中国互联网信息中心 . 第 44 次中国互联网发展状况统计报告 [R ] . 北京:中国网信网 , 2018 .
China Internet Network Information Center . The 44th statistical report on the development of China’s Internet [R ] . Beijing:Cyberspace Administration of China , 2018 .
KRUEGEL C , ROBERTSON W , VIGNA G . Detecting kernel-level rootkits through binary analysis [C ] // Proceedings of Computer Security Applications Conference . Piscataway:IEEE Press , 2004 : 91 - 100 .
张瑜 , 刘庆中 , 李涛 , 等 . Rootkit研究综述 [J ] . 电子科技大学学报 , 2015 ( 4 ): 563 - 578 .
ZHANG Y , LIU Q Z , LI T , et al . Research and development of Rootkit [J ] . Journal of University of Electronic Science and Technology of China , 2015 ( 4 ): 563 - 578 .
FU D S , CAO C L . A windows rootkit detection method based on cross-View [J ] . Information Technology , 2010 ( 2 ): 1 - 3 .
白光冬 , 郭耀 , 陈向群 . 一种基于交叉视图的 Windows Rootkit检测方法 [J ] . 计算机科学 , 2009 , 36 ( 8 ): 133 - 137 .
BAI G D , GUO Y , CHEN X Q . Windows rootkit detection method based on cross-view [J ] . Computer Science , 2009 , 36 ( 8 ): 133 - 137 .
陈晓苏 , 黄文超 , 肖道举 . 一种基于交叉视图的 Windows Rootkit检测方法 [J ] . 计算机工程与科学 , 2007 , 29 ( 7 ): 1 - 3 .
CHEN X S , HUANG W C , XIAO D J . A Windows rootkit detection method based on cross-view [J ] . Computer Engineering&Science , 2007 , 29 ( 7 ): 1 - 3 .
LEVINE J G , GRIZZARD J B , OWEN H . A methodology to detect and characterize kernel level rootkit exploits involving redirection of the system call table [C ] // Proceedings of Second IEEE International Information Assurance Workshop . Piscataway:IEEE Press , 2005 : 107 - 125 .
KRUEGEL C , ROBERTSON W , VIGN G . Detecting kernel-level rootkits through binary analysis [C ] // Computer Security Applications Conference . Piscataway:IEEE Press , 2004 : 91 - 100 .
GARFINKEL T , ROSENBLUM M . A virtual machine introspection based architecture for intrusion detection [C ] // Proceedings of Network and Distributed Systems Security Symposium . Piscataway:IEEE Press , 2003 : 253 - 285 .
WANG Z , JIANG X , CUI W , et al . Countering kernel rootkits with lightweight hook protection [C ] // Proceedings of the 16th ACM Conference on Computer and Communications Security . New York:ACM Press , 2009 : 545 - 554 .
田竞 , 孙慧琪 , 武希耀 , 等 . 一种基于安全优先架构的细粒度可信监测度量方法 [J ] . 信息安全学报 , 2019 , 4 ( 5 ): 23 - 31 .
TIAN J , SUN H Q , WU X Y , et al . A fine-grained trusted monitoring measurement method based on security-first architecture [J ] . Journal of Cyber Security , 2019 , 4 ( 5 ): 23 - 31 .
LEE H , MOON H , HEO I , et al . KI-Mon ARM:a hardware-assisted event-triggered monitoring platform for mutable kernel object [J ] . IEEE Transactions on Dependable and Secure Computing , 2019 , 16 ( 2 ): 287 - 300 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御Web服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 , 28 ( 4 ): 883 - 897 .
李卫超 , 冯俊龙 . 动态异构冗余的Web威胁感知技术研究 [J ] . 智能计算机与应用 , 2018 , 8 ( 4 ): 42 - 46 ,52.
LI W C , FENG J L . Research on dynamic heterogeneity redundant Web threat awareness technology [J ] . Intelligent Computer and Applications , 2018 , 8 ( 4 ): 42 - 46 ,52.
邬江兴 . 网络空间拟态防御研究 [J ] . 信息安全学报 , 2016 , 1 ( 4 ): 1 - 10 .
WU J X . Research on cyber mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 1 - 10 .
0
浏览量
380
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构