高混淆挂马网页的分析与检测系统
[Abstract]:Web Trojans exploit vulnerabilities in operating systems, browsers and related applications to spread and destroy. In order to avoid detection, the malicious code of web Trojan often goes through a certain degree of confusion. With the popularity of the Internet, the spread of web Trojan horse is becoming more and more rapid, the means of confusion is becoming more and more complex, and the harm caused by it is becoming more and more serious. It has been a key topic in the field of information security. In the face of the increasing number of web Trojan horses, confusion and avoidance of detection means emerge in endlessly, the current detection methods have highlighted many shortcomings. This paper first describes the mechanism of high confusion web Trojan horse, that is, its composition, source and detailed attack process. Then the methods of JavaScript confusion, VBScript obfuscation and Java obfuscation are summarized, including the common obfuscation methods and the latest obfuscation techniques. Then this paper describes the anti-detection techniques of high-confusion web Trojan horse, such as operating system fingerprint identification, domain name utilization and anti-honeypot technology. This paper also describes the vulnerability exploitation and load components of high-confusion web-horse. Through the study of the mechanism and characteristics of the highly obfuscated web Trojan, this paper proposes an anti-obfuscation method based on the key function hook of browser, which can obtain the source code without actually executing malicious code in the system. Then use dynamic detection and static detection methods to detect the source code after anti-confusion. Dynamic method is mainly to detect whether the source code contains Shellcode; static detection methods, including code feature statistics, code feature matching and URL feature matching; finally, get the detection results of web Trojan horse. On this basis, this paper establishes a web page Trojan detection system which combines dynamic detection and static detection. The detection system is built on Linux platform, using VirtualBox virtual machine and running Sanboxie sand table in it. The benefits of this dual virtual architecture are fast recovery, low overhead and high security. Finally, we have carried on the experiment, and has carried on the comparison with the similar web page Trojan detection system. The experimental results show that the system can detect various types of highly confusing web Trojan more effectively, and has higher accuracy, versatility and performance superiority.
【学位授予单位】:上海交通大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【共引文献】
相关期刊论文 前5条
1 邰非;周峰;张欣;张佩珍;朱明;崔梁屹;;异构流媒体平台间服务透明化设计与应用[J];计算机与数字工程;2014年03期
2 刘阳;黄皓;;Windows平台应用程序权限能力控制研究[J];计算机应用与软件;2014年10期
3 张阿莉;刁学敏;刘威;;新型飞行控制系统总线数据处理方法优化设计[J];现代电子技术;2014年07期
4 刘颖;王健;俞凯君;周学军;;急诊快速分诊专家系统软件开发与应用[J];自动化与仪器仪表;2015年02期
5 陈英婕;杨静宇;孟元凯;;IOCP在水下安防系统监控软件中的应用[J];现代电子技术;2015年04期
相关会议论文 前2条
1 杨儒良;杨榆;;基于MVC架构原理的电子文档安全管控系统的设计与实现[A];第十九届全国青年通信学术年会论文集[C];2014年
2 郑国勤;沈文都;于贵友;张雷;王琳;;BIM及建筑CAD软件中的图形平台技术研究[A];第十七届全国工程建设计算机应用大会论文集[C];2014年
相关硕士学位论文 前10条
1 姚明君;船舶分段合拢控制系统研究[D];湖北大学;2013年
2 姚泰然;基于机器视觉的手机镜片分拣系统研究[D];华中科技大学;2013年
3 郭光;Web服务器上比例延迟保证的分散自校正控制方法[D];北京交通大学;2014年
4 陈立鹏;南京地铁自动售票机支付与找零子系统的设计与开发[D];南京理工大学;2014年
5 王强;信息实时备份平台研究与实现[D];电子科技大学;2013年
6 王雅;标签自动化制作软件的设计与实现[D];北京工业大学;2013年
7 乔超;实时脑机接口关键技术研究及系统实现[D];郑州大学;2014年
8 兰勇;基于壳的软件保护机制的研究与实现[D];西南石油大学;2014年
9 舒波;基于OGRE的多视角裸眼立体显示与渲染技术研究[D];浙江工业大学;2014年
10 王尚飞;基于行为监控的木马检测系统研究与实现[D];北京邮电大学;2014年
本文编号:2302446
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2302446.html