面向Web隐藏后门技术的防御  被引量:1

Defense of hidden backdoor technology for Web

在线阅读下载全文

作  者:陈利跃 孙歆 成天晟 吴春明[3] 陈双喜[3,4] CHEN Liyue;SUN Xin;CHENG Tiansheng;WU Chunming;CHEN Shuangxi(State Grid Zhejiang Electric Power Co,Ltd,Hangzhou 310027,China;State Grid Zhejiang Electrice Power Co.,Ltd.Research Instute,Hangzhou 310027,China;Zhejiang University,Hangzhou 310058,China;Jiaxing Vocational and Technical College,Jiaxing 314036,China|)

机构地区:[1]国网浙江省电力有限公司,浙江杭州310027 [2]国网浙江省电力有限公司电力科学研究院,浙江杭州310027 [3]浙江大学,浙江杭州310058 [4]嘉兴职业技术学院,浙江嘉兴314036

出  处:《电信科学》2020年第5期39-46,共8页Telecommunications Science

基  金:国家电网总部科技项目(No.52110118001F)。

摘  要:Rootkit是一种持久且隐匿的攻击技术,通过修改操作系统软件或内核,更改指令执行路径,隐匿攻击行为和后门程序痕迹。首先介绍了Rootkit的基本定义及其演变过程,其次讨论了目前Rootkit工作原理、主流技术以及检测方法。然后通过安全性与性能对比实验,阐述了基于动态异构冗余架构搭建的拟态Web防御系统在木马攻击下的应用效果。实验结果表明,拟态Web防御系统能在较小开销的情况下有效地对木马攻击进行防御。最后总结了该系统在当前环境下所面临的机遇与挑战。Rootkit is a set of persistent and undetectable attack technologies, which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction. Firstly, the basic definition and evolution of Rootkit were introduced, then the operating principle, current mainstream technology and detection methods of Rootkit were discussed. Then, through comparative experiments on performance and security, the application of mimic defense system was described for Web based on dynamic, heterogeneous, redundant structure under Trojan Horse attack. Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead. At last, the opportunities and challenges of the DHR system were summarized.

关 键 词:ROOTKIT 动态异构冗余架构 拟态防御 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象