跳到主要內容

臺灣博碩士論文加值系統

(3.236.84.188) 您好!臺灣時間:2021/08/04 23:28
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:高振元
研究生(外文):Cheng-yuan Kao
論文名稱:後門偵測之研究
論文名稱(外文):Detecting Backdoor
指導教授:陳嘉玫陳嘉玫引用關係
指導教授(外文):Chia-Mei Chen
學位類別:碩士
校院名稱:國立中山大學
系所名稱:資訊管理學系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:37
中文關鍵詞:資料探勘後門入侵偵測網路安全
外文關鍵詞:Network SecurityBackdoorData MiningIntrusion Detection
相關次數:
  • 被引用被引用:0
  • 點閱點閱:124
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
網路如同社會的縮影,攻擊的事件時有所聞,只要是網路的參與者,無論是單純的使用者或管理者,其電腦或網路設備等都必須作好各項防範措施,時時更新修補漏洞、建置防毒軟體、防火牆和入侵偵測系統等來預防、偵測和阻擋網路攻擊。其中最難以查覺的是入侵者入侵之後植入後門程式使其能夠利用該系統資料或資源,例如竊取企業機密等。而在防護措施方面,入侵偵測系統肩負預警的功能,但此類系統多半需要監聽網路封包的標頭和內容判定是正常或是攻擊的流量,對於整個區域網路的負荷相當大。本研究即針對後門程式,期能藉由分析網路封包標頭資料的幫助,而能夠偵測出被植入的後門程式。
Cyber space is like a society. Attacking events happen all the time. No matter what is in the cyber space. We need to do many things to defend our computers and network devices
form attackers, for example: update patches, install anti-virus software, firewalls and intrusion detection system. In all kinds of network attacks, it is hard to detect that an attacker install a backdoor after he crack the system. He can do many things by the backdoor, like steal sensitive or secret information. Otherwise, intrusion detection systems are responsible for early warnings, but they usually need to capture all the network packets include the headers and contents to analyze. It costs many overheads for the system. The goal of our research is to detect backdoors correctly, and we only use the network packet headers to analyze.
第一章 緒論
第二章 文獻探討
第一節 後門程式研究
第二節 資料探勘在網路安全上的相關研究
第三章 問題描述與後門偵測方法
第一節 問題描述
第二節 後門偵測方法
第三節 系統建置
第四章 系統模擬與驗證
第一節 系統模擬
第二節 驗證
第五章 結論
第一節 貢獻
第二節 未來發展
參考文獻
1. [CC 03]CERT/CC Statistics 1988-2003
http://www.cert.org/stats/cert_stats.html#incidents
2. [CF 03]2003 CSI/FBI Computer Crime and Security Survey
http://www.gocsi.com/press/20030528.jhtml
3. [CO 95]COHEN, W. W., “Fast effective rule induction.” In Proceedings of 12th
International Conference on Machine Learning (Lake Tahoe, CA). Morgan Kaufmann, San Mateo, CA., 1995
4. [DJKD 01]Dickerson, J.E., Juslin, J., Koukousoula, O., Dickerson, J.A., “Fuzzy intrusion detection,” IFSA World Congress and 20th NAFIPS International Conference, 2001. Joint 9th
5. [FIST 98]Front-line Information Security Team (FIST). Network Security Solutions Ltd., “Techniques Adopted By ‘ System Crackers’ When Attempting to Break Into
Corporate or Sensitive Private Networks,” Dec 1998
http://www.ns2.co.uk/archive/FIST/papers/NSS-cracker.txt
6. [IPA 99] “IPAudit,” http://ipaudit.sourceforge.net/, 1999
7. [JLM 91] V. Jacobson, C. Leres, and S. McCanne,“tcpdump,”http://www.tcpdump.org/, 1991.
8. [MG 97] Michael J.A. Berry, Gordon S. Linoff, “Data Mining Techniques: for marketing, sales, and customer support, ” John Wiley & Sons, Inc, 1997 36
9. [MG 00]Michael J.A. Berry, Gordon S. Linoff, “Mastering Data Mining, The Art & Science of Customer Relationship Management, ” John Wiley & Sons, Inc, 2000
10. [SJG 99]Stuart McClure, Joel Scambray, George Kurtz, “Hacking Exposed: Network Security Secrets and Solutions,” Osborne/McGraw-Hill, 1999
11. [SK] 網路後門面面觀, http://buy.sky.net.cn/minisite/sc_horse_3.htm
12. [VM 99] “VMware,” http://www.vmware.com/, 1999
13. [W 02]William Stallings, “Cryptography and Network Security: Principles and Practice,” 3rd edition, Prentice-Hall , Inc. 2002
14. [WEKA 99] “Weka,”http://www.cs.waikato.ac.nz/ml/weka/, 1999
15. [WS 98]Wenke Lee and Salvatore J. Stolfo, “Data Mining Approaches for Intrusion Detection”, 1998 7th USENIX Security Symposium, 1998.
http://www1.cs.columbia.edu/~sal/hpapers/USENIX/usenix.html
16. [WSM 99]Wenke Lee; Stolfo, S.J.; Mok, K.W., ”A data mining framework for building intrusion detection models,” Security and Privacy, 1999. Proceedings of
the 1999 IEEE Symposium on , 9-12 May 1999, Page(s): 120 -132
17. [WSM2 99]Wenke Lee, Salvatore J. Stolfo and Kui W. Mok., “Mining in a data-flow environment: Experience in network intrusion detection.” ACM SIGKDD 1999
18. [WS 00]Wenke Lee, Salvatore J. Stolfo., “A framework for constructing features and models for intrusion detection systems.” ACM SIGKDD 2000
19. [UCI] UCI Knowledge Discovery in Databases Archive http://kdd.ics.uci.edu/
20. [YS 01]Yaw-Wen Huang, and Shih-Kun Huang, “A Survey and Assessment of Network Mapping Methods and Techniques,” Information Security Newsletter, Mar 2001, Vol. 7, No. 2, pp. 52-75.
21. [ZP1 00]Zhang, Y. and Paxson, V., “Detecting Backdoors,” Proceedings of the 9th USENIX Security Symposium, Aug 2000, pp.157-170.
22. [ZP2 00]Zhang, Y. and Paxson, V., “Detecting Stepping Stones,” Proceedings of the 9th USENIX Security Symposium, Aug 2000
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top