网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (1): 15-29.doi: 10.11959/j.issn.2096-109x.2022003

• 专栏:安全感知与检测方法 • 上一篇    下一篇

基于诱捕的软件异常检测综述

傅建明1,2, 刘畅1,2, 解梦飞1,2, 罗陈可1,2   

  1. 1 空天信息安全与可信计算教育部重点实验室,湖北 武汉 430072
    2 武汉大学国家网络安全学院,湖北 武汉 430072
  • 修回日期:2021-03-23 出版日期:2022-02-15 发布日期:2022-02-01
  • 作者简介:傅建明(1969− ),男,湖南宁乡人,博士,武汉大学教授、博士生导师,主要研究方向为系统安全、移动安全
    刘畅(1998− ),男,河南商丘人,武汉大学硕士生,主要研究方向为移动安全
    解梦飞(1997− ),男,山东青岛人,武汉大学硕士生,主要研究方向为系统安全
    罗陈可(1996− ),男,湖南郴州人,武汉大学博士生,主要研究方向为系统安全、二进制安全
  • 基金资助:
    国家自然科学基金(61972297);国家自然科学基金(62172308);国家自然科学基金(62172144)

Survey of software anomaly detection based on deception

Jianming FU1,2, Chang LIU1,2, Mengfei XIE1,2, Chenke LUO1,2   

  1. 1 Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, Wuhan 430072, China
    2 School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China
  • Revised:2021-03-23 Online:2022-02-15 Published:2022-02-01
  • Supported by:
    The National Natural Science Foundation of China(61972297);The National Natural Science Foundation of China(62172308);The National Natural Science Foundation of China(62172144)

摘要:

高级持续威胁(APT,advanced persistent threats)会使用漏洞实现攻击代码的自动加载和攻击行为的隐藏,并通过复用代码攻击绕过堆栈的不可执行限制,这是网络安全的重要威胁。传统的控制流完整性和地址随机化技术虽然有效抑制了APT的步伐,但软件的复杂性和攻击演化使软件仍存在被攻击的时间窗口。为此,以资源为诱饵的诱捕防御是确保网络安全的必要补充。诱捕机制包含诱饵设计和攻击检测两部分,通过感知与诱饵的交互行为,推断可能的未授权访问或者恶意攻击。针对文件、数据、代码3种诱饵类型,设计诱饵的自动构造方案并进行部署,从真实性、可检测性、诱惑性等方面对诱饵的有效程度进行度量。基于诱捕防御的勒索软件检测注重诱饵文件的部署位置,在漏洞检测领域,通过注入诱饵代码来检测代码复用攻击。介绍了在 APT 攻击各个阶段实施诱捕防御的相关研究工作,从诱饵类型、诱饵生成、诱饵部署、诱饵度量方面刻画了诱捕防御的机理;同时,剖析了诱捕防御在勒索软件检测、漏洞检测、Web安全方面的应用。针对现有的勒索软件检测研究在诱饵文件设计与部署方面的不足,提出了用于检测勒索软件的诱饵动态更新方法。讨论了诱捕防御面临的挑战,希望诱捕防御可以为发现未知攻击、溯源攻击意图提供理论和技术支持。

关键词: 高级持续威胁, 代码复用攻击, 控制流完整性, 地址随机化, 诱捕防御

Abstract:

Advanced persistent threats (APT) will use vulnerabilities to automatically load attack code and hide attack behavior, and exploits code reuse to bypass the non-executable stack & heap protection, which is an essential threat to network security.Traditional control flow integrity and address space randomization technologies have effectively prevented the pace of APT.However, the complexity of the software and the evolution of attacks make the software still being vulnerable.For this reason, deception defense with resources as bait is an indispensable supplement for network security.The trapping mechanism consists of bait design and attack detection, which infer possible unauthorized access or malicious attacks by sensing the interaction behavior with the bait.According to the three types of bait, which are file, data and code, the automatic construction scheme of bait is designed and deployed, and the effectiveness of bait is measured from the aspects of believability, detectability and enticement, etc.Ransom ware detection based on deception defense focuses on the deployment location of bait files, and in the area of vulnerability detection, code reuse attacks are detected by injecting bait code.Research work related to the implementation of deception defense in each phase of APT attacks was introduced, and the mechanism of deception defense from bait type, bait generation, bait deployment, and bait measurement was described.Simultaneously, deception defense applications in ransom ware detection, vulnerability detection, and Web security were analyzed.In response to the shortcomings of existing ransom ware detection research in terms of bait file design and deployment, a dynamic update method of bait for ransom ware detection was proposed.The deception defense challenges were discussed and hoped that deception defense can provide theoretical and technical support for discovering unknown attacks and attack attribution.

Key words: advanced persistent threat, code reuse attack, control flow integrity, address randomization, deception defense

中图分类号: 

No Suggested Reading articles found!