通信学报 ›› 2014, Vol. 35 ›› Issue (1): 156-166.doi: 10.3969/j.issn.1000-436x.2014.01.018

• 学术通信 • 上一篇    下一篇

基于覆盖率分析的僵尸网络控制命令发掘方法

王志,蔡亚运,刘露,贾春福   

  1. 南开大学 计算机与控制工程学院,天津 300071
  • 出版日期:2014-01-25 发布日期:2017-06-17
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家重点基础研究发展计划(“973”计划)基金资助项目;中央高校基本科研业务费专项基金资助项目;南开大学—腾讯联合基金资助项目

Using coverage analysis to extract Botnet command-and-control protocol

Zhi WANG,Ya-yun CAI,Lu LIU,Chun-fu JIA   

  1. College of Computer and Control Engineering,Nankai University,Tianjin 300071,China
  • Online:2014-01-25 Published:2017-06-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Fundamental Research Funds for the Central Universities;Nankai University-Tencent Joint Project

摘要:

从僵尸程序执行轨迹对二进制代码块的覆盖规律出发,提出了一种僵尸网络控制命令发掘方法。通过分析执行轨迹对代码块的覆盖率特征实现对僵尸网络控制命令空间的发掘,根据代码空间是否被全覆盖来验证发现的僵尸网络命令空间的全面性。对僵尸网络Zeus、SdBot、AgoBot的执行轨迹进行了代码块覆盖率分析,结果表明,该方法能够快速准确地发掘出僵尸网络的控制命令集合,时间和空间开销小,且该命令集合所对应的执行轨迹可以覆盖僵尸程序95%以上的代码空间。

关键词: 恶意代码分析, 僵尸网络, 命令与控制协议, 基本块, 覆盖率

Abstract:

There are some inherent patterns in the bot execution trace coverage of basic blocks.Using these patterns,an approach was proposed to infer Botnet command-and-control protocol (C&C protocol).Without intermediate representation of binary code and constraints solving,this approach has a lower time and space overhead.This coverage analysis approach was evaluated on 3 famous Botnet:Zeus,Sdbot and Agobot.The result shows that this approach can accurately and efficiently extract the Botnet control commands.And the completeness of the extracted control commands could be verified by checking whether all available basic blocks in bot are covered by the traces triggered by the control commands.

Key words: malware analysis, Botnet, command-and-control protocol, code block, code coverage

No Suggested Reading articles found!