簡易檢索 / 詳目顯示

研究生: 黃博緯
Po-wei Huang
論文名稱: Koobface殭屍網路防禦機制之研究
A Study of Defense Mechanism for Koobface Botnet
指導教授: 黎碧煌
Bih-Hwang Lee
口試委員: 鍾添曜
none
陳添智
none
吳傳嘉
Chwan-Chia Wu
余聲旺
none
學位類別: 碩士
Master
系所名稱: 電資學院 - 電機工程系
Department of Electrical Engineering
論文出版年: 2012
畢業學年度: 100
語文別: 中文
論文頁數: 74
中文關鍵詞: 殭屍網路殭屍病毒KOOBFACE社群網路釣魚式攻擊
外文關鍵詞: botnet, botnet virus, koobface, social network, phishing attack
相關次數: 點閱:209下載:3
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 現今殭屍網路 (Botnet)病毒於網路中迅速蔓延開來,其感染方式及擴散程度令人難以招架,近年來更透過社群網路大肆散佈,加上使用者對網路資訊安全的概念嚴重不足,造成駭客透過殭屍病毒(Botnet Virus)感染的電腦遠端控制進行攻擊,不論是要發廣告信件 (Spam Mail)、發動分散式阻斷服務攻擊 (Distributed Denial of Service;DDoS)、鍵盤側錄程式 (Keystroke Logging)、以釣魚式攻擊(Phishing Attack)竊取個人私密資料、或是近年來出現的點擊詐欺 (Click Fraud)都輕而易舉,如何將殭屍網路偵測及摧毀,為網路管理者的重要課題。本論文將以KOOBFACE殭屍網路病毒為範例,藉由實際安裝病毒,對樣本病毒進行分析,找出有效可清除病毒之機制,並製作偵測與清除程式,協助防毒軟體找出無法偵測的病毒,對使用者發出警告通知。最後本論文設計了三個實驗: (1)KOOBFACE中毒偵測與分析;(2) KOOBFACE病毒清除程式製作及分析;(3) KOOBFACE病毒清除程式解毒後偵測與分析,透過本論文之偵測與清除程式防禦殭屍病毒,以期達成讓使用者能夠安心操作電腦之保證。


    Botnet viruses spread rapidly on the network nowadays. It is difficult to defend because of various infection ways. In recent years, users lack the concept of network information security lead to botnets spread through social networks. Hackers are able to remotely control victim computers to carry out malicious or disturbing operations, such as DDOS attack, keystroke logging, click fraud, spam mail delivery, or phishing attack. How to detect computers to determine if they are being affected by botnet virus has become a major challenge. In this paper, we install a KOOBFACE virus, and analyze the computer to identify effective mechanisms to clear the virus. We proposed a detection and prevention system to assist in antivirus software against KOOBFACE botnets, and send the warning notice to the user. Finally, this paper designs two experiments to discuss the differences of infected computers and already cleared the virus computers. The two experiments include: (1) the statistics number of the malicious article post and deliver mail on infected computers; (2) the anti-virus system production and analysis; (3) the statistics number of the malicious article post and deliver mail on already cleared the virus computers. We expect this paper will be helpful for user to safely operate computers through the detection and prevention system.

    摘要iv Abstractv 誌謝vi 目錄vii 圖目錄ix 表目錄xii 第一章 緒論1 1.1研究背景1 1.2研究動機2 1.3研究目的3 1.4論文架構4 第二章 文獻探討5 2.1殭屍網路簡介5 2.2殭屍網路架構6 2.2.1 IRC-Based botnet 殭屍網路13 2.2.2 HTTP-Based botnet 殭屍網路15 2.2.3 P2P-Based botnet殭屍網路16 2.3殭屍網路的危害18 2.4KOOBFACE19 2.4.1 KOOBFACE傳播方式19 2.4.2 KOOBFACE創新技術20 2.4.3 KOOBFACE經濟效益23 2.5特徵偵測 (Signature-based Detection)24 2.6殭屍網路感染案例24 第三章 研究設計33 3.1研究方法33 3.2研究環境與工具34 3.2.1 系統環境設定34 3.2.2 系統使用工具34 3.2.3 實驗用病毒簡介36 3.3研究架構42 3.3.1 實驗一之實驗架構42 3.3.2 實驗二之實驗架構43 3.3.3 實驗三之實驗架構50 第四章 實驗結果與分析52 4.1實驗一之結果與分析52 4.1.1 各實驗組之惡意訊息發文/發信次數與累積次數分析52 4.1.2 各實驗組之惡意連結點擊累積次數與可能觸及人數分析54 4.1.3 中毒後各類數據與偵測時間分析55 4.2實驗二之病毒程式分析58 4.2.1 實驗用病毒網路行為分析58 4.2.2 實驗用病毒電腦行為分析67 4.3實驗三之結果與分析68 4.4實驗分析歸納70 第五章 結論與未來工作71 參考書目72

    [1] 電腦應用概況報告:民國99年。行政院主計處電子處理資料中心。2011。
    [2] Symantec, “Internet Security Threat Report: 2011 Trends,” Symantec, 2012.
    [3] Tanner, B.K., Warner, G., Stern, H., Olechowski, S, “Koobface: the Evolution of the Social Botnet,”Paper presented at eCrime Researchers Summit (eCrime), Birmingham, 2010.
    [4] T. M. Arnold, A comparative analysis of rootkit detection techniques, ProQuest, UMI Dissertation Publishing , 2011.
    [5] Alice Decker, David Sancho, Max Goncharov, Robert McArdle, “Ilomo Botnet:A study of the Ilomo / Clampi Botnet,” TrendMicro, 2009.
    [6] Cox, A., and Golomb, G., “The Kneber Botnet,” NetWitness Corporation, Herndon, VA, 2010.
    [7] Nicole Immorlica, Kamal Jain, Mohammad Mahdian, and Kunal Talwar, “Click Fraud Resistant Methods for Learning Click-Through Rates,” vol.3828, New York, Springer Verlag, 2007, pp. 34-45.
    [8] Kurt Thomas, David M. Nicol, “The Koobface Botnet and the Rise of Social Malware,” Paper presented at MALWARE 2010 5th International Conference, Nancy, 2010.
    [9] Julian B. Grizzard, Vikram Sharma, Chris Nunnery,Brent ByungHoon Kang, David Dagon, “Peer-to-Peer Botnets: Overview and Case Study,” Paper presented at The First Workshop on Hot Topics in Understanding Botnets, Cambridge, 2007.
    [10] Chung-Huang Yang, Kuang-Li Ting , “Fast Deployment of Botnet Detection with Traffic Monitoring,” Paper presented at Intelligent Information Hiding and Multimedia Signal Processing 2009 Fifth International Conference, Kyoto, 2009.
    [11] Ivan Arce , Elias Levy , Elias Levy, “An Analysis of the Slapper Worm,” IEEE Security & Privacy, pp. 82-87, 2003.
    [12] Craig Schiller, Jim Binkley, Gadi Evron , Carsten Willems, Tony Bradley, David Harley, Michael Cross, Botnets: The Killer Web App, Syngress, 2007.
    [13] G. Ollmann, “Botnet Communication Topologies:Understanding the intricacies of botnet command-and-control,” DAMBALLA, 2009.
    [14] R. Pur, “Bots & Botnet: An Overview,” SANS Institute, 2003.
    [15] Zhuge Jian-Wei, Han Xin-Hui, Zhou Yong-Lin, Song Cheng-Yu, Guo Jin-Peng, Zou Wei, “HoneyBow: an automated malware collection tool based on the,” Journal on Communications, vol. 28, no. 12, pp. 8-13, 12 2007.
    [16] Ping Wang, Sherri Sparks, Cliff C. Zou, “An advanced hybrid peer-to-peer botnet,” Paper presented at The First Workshop on Hot Topics in Understanding Botnets, Cambridge, 2007.
    [17] K. Thomas, “The Koobface botnet and the rise of social malware,” Paper presented at Malicious and Unwanted Software (MALWARE), 2010 5th International Conference, Champaign, 2010.
    [18] M. Almgren, H. Bos, S. Ioannidis, E. Kirda, K. Marakomihelaki, “FORWARD Threat Report: Managing emerging threats in ICT Infrastructures,” Working Group Leaders, Karlsplatz, 2009.
    [19] 陳嘉玫,網路安全的社交工程。科學發展,第461冊, 第16-23頁, 2011。
    [20] L. von Ahn, B. Maurer, C. McMillen, D. Abraham, and M. Blum, “reCAPTCHA: Human-Based Character Recognition via Web Security Measures,” Science, vol. 321, no. 5895, pp. 1465-1468, 2008.
    [21] M. B. N. H. a. J. L. L. von Ahn, “CAPTCHA: Using hard AI problems for security,” Paper presented at Eurocrypt 2003, Warsaw, 2003.
    [22] 莊淵全,惡意程式分析報告 Exploit.Win32.Pidief.cvd。教育學術網路系統安全保證及反駭客控制技術研發中心,2010。
    [23] 莊淵全,惡意程式分析報告 TR.Dropper.Gen。教育學術網路系統安全保證及反駭客控制技術研發中心,2010。
    [24] 莊淵全,惡意程式分析報告 TR.Spy.Goldun.RS。教育學術網路系統安全保證及反駭客控制技術研發中心,2010。
    [25] A. Orebaugh, G. Ramirez, J. Burke, and J. Beale, “Wireshark and Ethereal network protocol analyzer,” Syngress Media Inc, 2007.

    QR CODE