高级持续性威胁中的典型隐蔽通信技术研究
[Abstract]:With the wide application of Internet technology in various fields, the problem of information security has been paid more and more attention. APT (Advanced persistent threat) attack, which takes advanced penetration and communication technology as the means, has the characteristics of strong concealment and persistence, which has become a great hidden danger to the network security at present. Aiming at the hot issue of APT in the field of information security, this paper takes the typical covert communication used in each stage of APT attack as the research object, designs and implements a number of covert communication methods, and carries out experimental verification and analysis. The method can provide technical support for modeling and analysis of APT data stream. The main research work of this paper is as follows: (1) according to the characteristics of APT attack, the existing attack chain model is used for reference. The potential covert communication methods in each stage of APT attack are deeply analyzed. (2) CC (control and command server address acquisition is the most important problem to be solved for malicious nodes sneaking into the network to implement covert communication. In this paper, the traditional address acquisition method is introduced in detail, and then the principle of DGA (Domain name Generation algorithm) and the existing detection methods are introduced. On this basis, this paper points out the shortcomings of DGA security, designs and implements a CC address acquisition method based on web page information hiding. (3) data handling mainly depends on camouflage communication technology, camouflage is divided into Behavior-based camouflage and Protocol-based camouflage. Aiming at the behavior based camouflage, this paper proposes a threshold cipher based data handling method for multi-disk sharing, which includes the design of the data partitioning algorithm and the design of the data sharing protocol. The partition algorithm is mainly based on the threshold secret sharing method. The sharing protocol realizes the interaction between the attack node and the network disk. Finally, the open source API based on the network disk is designed to build the system. The feasibility and effectiveness of the proposed method are verified. (4) A camouflage communication based on SSL protocol is designed and implemented for the camouflage covert communication. Based on the original SSL protocol, this method analyzes and models the behavior sequence, length sequence and time series of the typical applications, which makes the camouflage communication have a high similarity with the normal communication. At the end of the paper, the paper summarizes the whole paper and looks forward to the problems worth further study in the future.
【学位授予单位】:江苏科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP393.08
【参考文献】
相关期刊论文 前10条
1 郑威;兰少华;树雅倩;朱书宏;;基于HTTP请求行为的组合式隐蔽信道的构造研究[J];计算机应用与软件;2016年11期
2 张小松;牛伟纳;杨国武;卓中流;吕凤毛;;基于树型结构的APT攻击预测方法[J];电子科技大学学报;2016年04期
3 梁亦清;林嘉靖;孙嘉敏;;反弹端口在远程控制软件中的应用与实现[J];电脑知识与技术;2016年06期
4 吴成茂;;直方图均衡化的数学模型研究[J];电子学报;2013年03期
5 杨岳湘;邓文平;邓劲生;李阳;;基于云存储的网盘系统架构及关键技术研究[J];电信科学;2012年10期
6 谷传征;王轶骏;薛质;;基于DNS协议的隐蔽信道研究[J];信息安全与通信保密;2011年12期
7 刘资茂;李芝棠;李战春;李冬;方平;;基于代理控制力的Fast-Flux僵尸网络检测方法[J];广西大学学报(自然科学版);2011年S1期
8 侯文滨;吴成茂;;基于Arnold变换的图像分存加密方法[J];计算机应用;2011年10期
9 朱奎龙;侯丽敏;;抗解压缩/压缩攻击的MP3压缩域音频水印[J];上海大学学报(自然科学版);2008年04期
10 游韵;喻占武;;基于椭圆曲线公钥算法的SSL协议分析和实现[J];微计算机信息;2006年30期
相关博士学位论文 前1条
1 焦栋;门限秘密共享策略及其应用研究[D];大连理工大学;2014年
相关硕士学位论文 前5条
1 佟海奇;面向未知木马的APT攻击检测方法研究[D];北京邮电大学;2015年
2 章思宇;基于DNS流量的恶意软件域名挖掘[D];上海交通大学;2014年
3 康乐;基于DNS数据流的僵尸网络检测技术研究[D];哈尔滨工业大学;2011年
4 王立彦;HTTPS协议中间人攻击的实现与防御[D];东北大学;2011年
5 文志军;基于ICMP协议的控守系统研究与实现[D];解放军信息工程大学;2009年
,本文编号:2186560
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2186560.html