博碩士論文 975302011 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系在職專班zh_TW
DC.creator林郁展zh_TW
DC.creatorYu-chan Linen_US
dc.date.accessioned2012-7-25T07:39:07Z
dc.date.available2012-7-25T07:39:07Z
dc.date.issued2012
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=975302011
dc.contributor.department資訊工程學系在職專班zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstractRootkit 是目前最常被攻擊者用來隱藏其攻擊行為的工具,現有的Rootkit 檢測機 制大多以檢查系統的靜態特徵或比對系統的完整性等方式偵測Rootkit,但攻擊者可透 過不同的方式混淆系統的特徵值,而快速即時的完整性確認亦不易達成。 因此本論文 提出一精確、快速即時的Rootkit 偵測機制–Discoverer–以提昇系統偵測Rootkit 的 能力。由於攻擊者的網路連線及攻擊者正在執行的程序是Root kit 主要的隱藏對象, 因此 Discoverer 藉由找出被隱藏的網路連線及程序偵測Rootkit。為了管理網路連線 及程序,作業系統內包含有各式的資料結構來記錄相關的訊息,攻擊者可加入甚至修改 程式碼以讓使用者無法得知攻擊者的網路連線或正在執行的攻擊者程序,但若藉由竄改 與網路連線或程序相關的資料結構,如run queue,來達成上述目的,則很可能會破壞 系統的正常運作,因此這些資料結構中的資訊是最能真實反應系統狀態的資訊,本論文 利用新增的系統呼叫,將使用者模式下所列出的程序相關資料(如ps、netstat)傳入核 心,與系統內部相關資料結構中的資訊逐一比對。找出隱藏程序的pid、socket 連線、 及所存取的file 名稱與路徑。實驗結果顯示Discoverer 可精確地偵測出我們所蒐集到 的各式Rootkit。 zh_TW
dc.description.abstractRootkit is most often used by attacker to hide their behavior, the Rootkit detection mechanisms mostly focus on static characteristics or the integrity of the system, but the attacker can confuse the system eigenvalues through various ways , and the integrity of the rapid real-time confirmation would not be easy to reach. This paper presents an accurate, rapid real-time Rootkit detection mechanisms-Discoverer-to enhance the ability of the system to detect Rootkit. Since the attacker’’s network connection and the running process is the main hidden object of Rootkit, Discoverer by locating the hidden network connections and process to detect Rootkits. In order to manage network connections and process, the operating system contains a variety of data structures to record the relevant message, the attacker can be added or even modify the code to allow users to not know the attacker’’s network connection, or are under implementation process of the attacker, but if by tampering with the network connection or process-related data structures, such as the run queue, to achieve the above purpose, they are likely to undermine the normal functioning of the system, so the information in these data structures can be a true reflection of system status information, this paper list and send all the user mode process information (such as ps, the netstat) into the Kernel by adding the new system call, and compare one by one with kernel data .Then find out the hidden process PID, socket connections, and the access file name and path. The experimental results show that Discoverer can accurately detect all kinds of Rootkits which we collected. en_US
DC.subject核心zh_TW
DC.subject程序zh_TW
DC.subjectprocessen_US
DC.subjectRootkiten_US
DC.titleDiscoverer- Rootkit即時偵測系統zh_TW
dc.language.isozh-TWzh-TW
DC.titleDiscoverer- a realtime Rootkit detection systemen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明