电信科学 ›› 2020, Vol. 36 ›› Issue (5): 39-46.doi: 10.11959/j.issn.1000-0801.2020142

• 专题:网络安全的智能化和高对抗性发展 • 上一篇    下一篇

面向Web隐藏后门技术的防御

陈利跃1,孙歆2,成天晟3,吴春明3,陈双喜3,4()   

  1. 1 国网浙江省电力有限公司,浙江 杭州 310027
    2 国网浙江省电力有限公司电力科学研究院,浙江 杭州 310027
    3 浙江大学,浙江 杭州 310058
    4 嘉兴职业技术学院,浙江 嘉兴 314036
  • 修回日期:2020-04-25 出版日期:2020-05-20 发布日期:2020-05-18
  • 作者简介:陈利跃(1973- ),男,国网浙江省电力有限公司处长、高级工程师,主要研究方向为信息安全管理|孙歆(1981- ),男,国网浙江省电力有限公司电力科学研究院高级工程师,主要研究方向为新型网络安全攻防|成天晟(1995- ),男,浙江大学硕士生,主要研究方向为网络空间安全|吴春明(1967- ),男,浙江大学教授、博士生导师,主要研究方向为人工智能、柔性可重构网络体系、软件定义网络、网络主动防御创新安全技术等|陈双喜(1980- ),男,嘉兴职业技术学院讲师,浙江大学博士生,主要研究方向为网络空间安全的渗透与主动防御
  • 基金资助:
    国家电网总部科技项目(52110118001F)

Defense of hidden backdoor technology for Web

Liyue CHEN1,Xin SUN2,Tiansheng CHENG3,Chunming WU3,Shuangxi CHEN3,4()   

  1. 1 State Grid Zhejiang Electric Power Co.,Ltd.,Hangzhou 310027,China
    2 State Grid Zhejiang Electric Power Co.,Ltd.Research Institute,Hangzhou 310027,China
    3 Zhejiang University,Hangzhou 310058,China
    4 Jiaxing Vocational and Technical College,Jiaxing 314036,China
  • Revised:2020-04-25 Online:2020-05-20 Published:2020-05-18
  • Supported by:
    The Science and Technology Funding Project of State Grid(52110118001F)

摘要:

Rootkit是一种持久且隐匿的攻击技术,通过修改操作系统软件或内核,更改指令执行路径,隐匿攻击行为和后门程序痕迹。首先介绍了Rootkit的基本定义及其演变过程,其次讨论了目前Rootkit工作原理、主流技术以及检测方法。然后通过安全性与性能对比实验,阐述了基于动态异构冗余架构搭建的拟态Web防御系统在木马攻击下的应用效果。实验结果表明,拟态Web防御系统能在较小开销的情况下有效地对木马攻击进行防御。最后总结了该系统在当前环境下所面临的机遇与挑战。

关键词: Rootkit, 动态异构冗余架构, 拟态防御

Abstract:

Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.

Key words: Rootkit, dynamic heterogeneous redundant structure, mimic defense

中图分类号: 

No Suggested Reading articles found!