通信学报 ›› 2017, Vol. 38 ›› Issue (Z1): 118-126.doi: 10.11959/j.issn.1000-436x.2017244

• 学术论文 • 上一篇    下一篇

网络协议隐形攻击行为的挖掘和利用

胡燕京1,2,裴庆祺2   

  1. 1 武警工程大学网络与信息安全武警部队重点实验室,陕西 西安 710086
    2 西安电子科技大学综合业务网理论及关键技术国家重点实验室,陕西 西安 710071
  • 出版日期:2017-10-01 发布日期:2018-06-07
  • 作者简介:胡燕京(1980-),男,陕西西安人,博士,武警工程大学讲师,主要研究方向为信息系统安全防护、网络协议逆向分析。|裴庆祺(1975-),男,广西玉林人,西安电子科技大学教授、博士生导师,主要研究方向为数字内容保护与无线网络安全。
  • 基金资助:
    国家自然科学基金资助项目(61373170);国家自然科学基金资助项目(61402530);国家自然科学基金资助项目(61309022);国家自然科学基金资助项目(61309008)

Mining and utilization of network protocol’s stealth attack behavior

Yan-jing HU1,2,Qing-qi PEI2   

  1. 1 Network and Information Security Key Laboratory,Engineering University of the Armed Police Force,Xi’an 710086,China
    2 National Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
  • Online:2017-10-01 Published:2018-06-07
  • Supported by:
    The National Natural Science Foundation of China(61373170);The National Natural Science Foundation of China(61402530);The National Natural Science Foundation of China(61309022);The National Natural Science Foundation of China(61309008)

摘要:

网络协议的隐形攻击行为生存性、隐蔽性和攻击性强,且不易被现有的安全防护手段检测到。为了弥补现有协议分析方法的不足,从实现协议程序的指令入手,通过动态二进制分析捕获协议的正常行为指令序列。然后通过指令聚类和特征距离计算挖掘出潜在的隐形攻击行为指令序列。将挖掘出的隐形攻击行为指令序列以内联汇编的方式加载到通用运行框架,在自主研发的虚拟分析平台HiddenDisc上动态分析执行,并评估隐形攻击行为的安全性。除了挖掘分析和有针对性的防御隐形攻击行为之外,还通过自主设计的隐形变换方法对隐形攻击行为进行形式变换,利用改造后的隐形攻击行为对虚拟靶机成功实施了攻击而未被发现。实验结果表明,对协议隐形攻击行为的挖掘是准确的,对其改造利用以增加信息攻防能力。

关键词: 协议逆向分析, 隐形攻击行为, 指令聚类, 隐形变换

Abstract:

The survivability,concealment and aggression of network protocol’s stealth attack behaviors were very strong,and they were not easy to be detected by the existing security measures.In order to compensate for the shortcomings of existing protocol analysis methods,starting from the instructions to implement the protocol program,the normal behavior instruction sequences of the protocol were captured by dynamic binary analysis.Then,the potential stealth attack behavior instruction sequences were mined by means of instruction clustering and feature distance computation.The mined stealth attack behavior instruction sequences were loaded into the general executing framework for inline assembly.Dynamic analysis was implemented on the self-developed virtual analysis platform HiddenDisc,and the security of stealth attack behaviors were evaluated.Excepting to mining analysis and targeted defensive the stealth attack behaviors,the stealth attack behaviors were also formally transformed by the self-designed stealth transformation method,by using the stealth attack behaviors after transformation,the virtual target machine were successfully attacked and were not detected.Experimental results show that,the mining of protocol stealth attack behaviors is accurate,the transformation and use of them to increase information offensive and defensive ability is also feasible.

Key words: protocol reverse analysis, stealth attack behavior, instruction clustering, stealth transformation

中图分类号: 

No Suggested Reading articles found!