跳到主要內容

臺灣博碩士論文加值系統

(18.97.14.86) 您好!臺灣時間:2025/02/07 20:07
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:呂開明
研究生(外文):Kaimin Lu
論文名稱:基於電腦資安攻防之惡意程式研析與實作
論文名稱(外文):MALICIOUS PROGRAM ANALYZER AND IMPLEMENTION BASED ON THE COMPUTER INFORMATION SECURITY ATTACK AND DEFENCE
指導教授:陳建華陳建華引用關係
指導教授(外文):Chienhua Chen
學位類別:碩士
校院名稱:大同大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2006
畢業學年度:94
語文別:英文
論文頁數:49
中文關鍵詞:遠端遙控程式惡意程式
外文關鍵詞:win32 PE formatwin32 Api
相關次數:
  • 被引用被引用:0
  • 點閱點閱:286
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:1
近年來網路的攻擊活動讓我們防不勝防,這其中以木馬程式危害個人隱私最甚。許多電腦用戶所仰賴的掃毒程式並不能提供他們甚麼保證,因為要偵測木馬程式實在十分不容易,因此,我們希望藉由本篇論文研究木馬程式所使用的技術,進而瞭解木馬程式的特性,從而達到反制木馬程式的目的,並進一步分析木馬程式與作業系統的弱點的關係,從而加強作業系統的安全掌控。 在資料完成蒐集及研析後,我們將根據木馬程式的特性及所需的規格,實作出一個木馬程式以測試相關商用防毒工具及防火牆之檢測能力
Current commercial antivirus software could not guarantee much, because it is not easy to detect the Trojan program. In this thesis, we focus on the characteristics of the Trojan programs and try to realize their key techniques and the correlation between them and the operating system. The system weakness for invasion are analyzed and the finding can be used to design more secure operation system. After the data collection and analysis, we build a Trojan program on the basis of the regular characteristics and test it against both the commercial antivirus softwares and firewalls.
CHINESE ABSTRACT………………i
ENGLISH ABSTRACT……………ii
ACKNOWLEDGEMENTS………iii
TABLE OF CONTENTS……………iv
LIST OF FIGURES………vi
LIST OF TABLES……vii
CHAPTER
1 Introduction……1
2 Related Researches……3
2.1 Researches of back door and Trojan programs..3
2.2 Research Direction..........5
2.3 Relevant software tool description...6
3 Research Method......8
3.1 Relevant information of techniques and mechanisms of back door and Trojan programs.....8
3.2 Collection of important or famous Trojan programs........8
3.3 Collection and coordination of websites’ information.….......9
3.4 Analysis and comparison of relevant back door and Trojan programs.....13
4 Principles and Attack Methods of Trojan and Back door programs...........15
4.1 Application analysis of Win32 API........15
4.2 The analysis of exploits from the Win32 system.....17
4.3 Study of lurking techniques and attack methods....19
4.4 Planning of attack mechanism and software design..............20
4.5 Mechanism design of Trojan programs...........20
4.6 The writing of design documentation...........20
5 System Test and Confirmation……......22
5.1 Testing environment.......................22
5.2 Testing Procedure..............................22
5.3 Testing procedure of back door and Trojan programs...........24
5.4 Testing results of back door and Trojan programs.................26
5.5 Tesing results of antivirus software and firewalls..................29
6 Conclusions.........................................30
REFERENCES…....39
APPENDIXES
Appendix A........31
Appendix B..................33
Appendix C...............36
LIST OF FIGURES
Figure 4.1 The structure of Win32 systems........................16
Figure 4.2 Procedure of API calling.....................16
Figure 4.3 Memory management of Win98/ME.............17
Figure 4.4 Memory management of WinNT/2K............17
Figure 5.1Client’s waiting for connection.....................23
Figure 5.2 Reconnecting Server in receiving area...............23
Figure 5.3 Prepare to operate.................................24
Figure 5.4 File operation............................................24
Figure 5.5 Process management..............................25
Figure 5.6 CMD Shell operation...........................25
Figure 5.7 Process checking...................................26
LIST OF TABLES
Table 5.1 Characteristic data sheet of the Trojan program....27
Table A.1 The port usage of famous back and Trojan programs……31
Table B.1 Commercial remote control and back door programs source and address…………33
Table B.2 The comparison of commercial remote control and back door programs……………34
Table C.1 The function of Trojan program…………36
REFERENCES
[1] W. A. Arbaugh, D. J. Farber, and J. M. Smith, “A secure and reliable bootstrap architecture,” In Proceedings of 1997 IEEE Symposium on Computer Security and Privacy, pp. 65-71, 1997.
[2] J. Butler and G. Hoglund, “VICE—catch the hookers,” Black Hat USA, July 2004, http://www.blackhat.com/presentations/bh-usa-04/bh-us-04-butler/bh-us-04-butler.pdf.
[3] G. H. Kim and E. H. Spafford, “The design and implementation of Tripwire a file system integrity checker,” In Proceedings of 1994 ACM Conference on Computer and Communications Security (CCS), pp. 18-29, November 1994.
[4] David A. Solomon & Mark E. Russionovich, Inside Windows 2000 (Microsoft Programming Series), 3rd Ed., Microsoft Press, September 2000.
[5] Prasad Dabak, Milind Borate & Sandeep Phadke, Undocumented Windows NT, John Wiley & Sons, October 1999.
[6] Sven B. Schreiber, Undocumented Windows 2000 Secrets: A Programmer's Cookbook, Addison-Wesley Pub Co, May 2001.
[7]Gary Nebbett, Windows NT/2000 Native API Reference, New Riders Publishing, February 2000.
[8] R. P. Goldberg, “Survey of virtual machine research,” IEEE Computer, pp. 34–45, June 1974.
[9] D. Gollmann, Computer Security, 2nd edition. John Wiley and Sons, Inc., January 2006.
[10] Halflife, “Abuse of the Linux kernel for fun and profit, ”Phrack, vol. 7, no. 50, April 1997.
[11] J. S. Heidemann and G. J. Popek, “File-system development with stackable layers,” ACM Transactions on Computer Systems, vol. 12, no. 1, pp. 58-89, February 1994.
[12] G. Hoglund and J. Butler, Rootkits: Subverting the Windows Kernel. Addison-Wesley, 2005.
[13] A. Joshi, S. T. King, G. W. Dunlap, and P. M.Chen, “Detecting past and present intrusions through vulnerability-specific predicates,” In Proceedings of the 2005 Symposium on Operating Systems Principles (SOSP), pp. 91-104, October 2005.
[14] J. Butler, J. L. Undercoffer, and J. Pinkston, “Hidden processes: The implication for intrusion detection,” In Proceedings of the 2003 Workshop on Information Assurance, pp. 116-121, June 2003.
[15] S. T. King, G. W. Dunlap, and P. M. Chen, “Debugging operating systems with time-traveling virtual machines,” In Proceedings of the 2005 USENIX Technical Conference, pp. 1-15, April 2005.
[16] G. J. Popek and R. P. Goldberg, “Formal requirements for virtualizable third generation architectures,” Communications of the ACM, vol. 17, no. 7, pp.412-421, July 1974.
[17] J. Rutkowska, “Detecting windows server compromises,” In HivenCon Security Conference, November 2003, http://invisiblethings.org/papers/hivercon03_joanna.ppt.
[18] Matt Pietrek, Windows95 System Programming Secrets, Hungry Minds, Inc, November 1995.
[19] Walter Oney, Systems Programming for Windows 95 with Disk, July 1996.
[20] Jeffrey Richter, Programming Applications for Microsoft Windows, 4th Ed., Microsoft Press, September 1999.
[21] P. M. Chen and B. D. Noble, “When virtual is better than real,” In Proceedings of the 2001 Workshop on Hot Topics in Operating Systems (HotOS), pp. 133–138, May 2001.
[22] G. W. Dunlap, S. T. King, S. Cinar, M. Basrai, and P. M. Chen, “ReVirt: Enabling intrusion analysis through virtual-machine logging and replay,” In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), pp. 211–224, December 2002.
[23] Fuzen Op, “The fu rootkit,” http://www.rootkit.com/project.php?id=9.
[24] R. Goldberg, “Architectural principles for virtual computer systems,” Ph.D. dissertation, Harvard University, February 1973.
[25] MIL-STD-498, Software Development and Documentation, 1994.
[26]尤焙麟 譯,駭客現形 — 網路安全之秘辛與解決方案,美商麥格羅希爾國際股份有限公司,2000年4月。
[27] Kenny H. 編著,網路系統 — 入侵與保護,長諾圖書,1999年1月。
[28]秘密客 著,對不起,駭到你,第三波資訊股份有限公司,2001年1月。
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關論文
 
1. 李惠宗(1990),<就平等立法之原理論合理差別之基準(中)>,《軍法專刊》,第36卷第8期.頁14。
2. 李惠宗(1990),<就平等立法之原理論合理差別之基準(上)>,《軍法專刊》,第36卷第7期.頁19。
3. 李惠宗(1990),<就平等立法之原理論合理差別之基準(下)>,《軍法專刊》,第36卷第9期.頁18。
4. 吳庚(1989),<重建公務員關係的法理基礎>,《法令月刊》,第40卷第8期。
5. 何佐治(1957),<大法官不是憲法上之法官>,《法令月刊》,第8卷第12期,頁10。
6. 葉長明(1995),<公務人員退休撫卹制度述論>,《銓敘與公保月刊》,第5卷,第6期,頁23-29。
7. 楊與齡(1977),<各國憲法關於法官任期之比較研究>,《憲政時代》,第2卷第4期,頁6。
8. 程明修(1999),<德國行政學上法律關係論的發展—以公務員法律關係為例>,《公務人員月刊》,第35期,頁11-19。
9. 陸潤康(1957),<大法官是否法官問題之探究>,《法令月刊》,第8卷第11期,頁14。
10. 陳愛娥(2000),<法官評鑑與身分保障>,《憲政時代》,第26卷,第1期,頁37-47。
11. 陳金貴(1996),<我國實施公務人員新退撫制度的省思>,《公務人員月刊》,第18期,頁13-18。
12. 張永明(2000),<法官地位、身分保障與法官評鑑>,《憲政時代》,第26卷第1期.頁29。
13. 張文郁(2000),<法官評鑑與法官獨立>,《憲政時代》,第26卷第1期。
14. 袁再興(2000),<從提高裁判品質談起—兼論法官應提升人文素養及建立正確之價值觀論>,《司法周刊》,第972期2版。
15. 翁岳生(1981),<美國法官之人事制度>,《憲政論壇》,第26卷,第11期。