高混淆掛馬網(wǎng)頁的分析與檢測系統(tǒng)
[Abstract]:Web Trojans exploit vulnerabilities in operating systems, browsers and related applications to spread and destroy. In order to avoid detection, the malicious code of web Trojan often goes through a certain degree of confusion. With the popularity of the Internet, the spread of web Trojan horse is becoming more and more rapid, the means of confusion is becoming more and more complex, and the harm caused by it is becoming more and more serious. It has been a key topic in the field of information security. In the face of the increasing number of web Trojan horses, confusion and avoidance of detection means emerge in endlessly, the current detection methods have highlighted many shortcomings. This paper first describes the mechanism of high confusion web Trojan horse, that is, its composition, source and detailed attack process. Then the methods of JavaScript confusion, VBScript obfuscation and Java obfuscation are summarized, including the common obfuscation methods and the latest obfuscation techniques. Then this paper describes the anti-detection techniques of high-confusion web Trojan horse, such as operating system fingerprint identification, domain name utilization and anti-honeypot technology. This paper also describes the vulnerability exploitation and load components of high-confusion web-horse. Through the study of the mechanism and characteristics of the highly obfuscated web Trojan, this paper proposes an anti-obfuscation method based on the key function hook of browser, which can obtain the source code without actually executing malicious code in the system. Then use dynamic detection and static detection methods to detect the source code after anti-confusion. Dynamic method is mainly to detect whether the source code contains Shellcode; static detection methods, including code feature statistics, code feature matching and URL feature matching; finally, get the detection results of web Trojan horse. On this basis, this paper establishes a web page Trojan detection system which combines dynamic detection and static detection. The detection system is built on Linux platform, using VirtualBox virtual machine and running Sanboxie sand table in it. The benefits of this dual virtual architecture are fast recovery, low overhead and high security. Finally, we have carried on the experiment, and has carried on the comparison with the similar web page Trojan detection system. The experimental results show that the system can detect various types of highly confusing web Trojan more effectively, and has higher accuracy, versatility and performance superiority.
【學(xué)位授予單位】:上海交通大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.08
【共引文獻(xiàn)】
相關(guān)期刊論文 前5條
1 邰非;周峰;張欣;張佩珍;朱明;崔梁屹;;異構(gòu)流媒體平臺間服務(wù)透明化設(shè)計與應(yīng)用[J];計算機(jī)與數(shù)字工程;2014年03期
2 劉陽;黃皓;;Windows平臺應(yīng)用程序權(quán)限能力控制研究[J];計算機(jī)應(yīng)用與軟件;2014年10期
3 張阿莉;刁學(xué)敏;劉威;;新型飛行控制系統(tǒng)總線數(shù)據(jù)處理方法優(yōu)化設(shè)計[J];現(xiàn)代電子技術(shù);2014年07期
4 劉穎;王健;俞凱君;周學(xué)軍;;急診快速分診專家系統(tǒng)軟件開發(fā)與應(yīng)用[J];自動化與儀器儀表;2015年02期
5 陳英婕;楊靜宇;孟元凱;;IOCP在水下安防系統(tǒng)監(jiān)控軟件中的應(yīng)用[J];現(xiàn)代電子技術(shù);2015年04期
相關(guān)會議論文 前2條
1 楊儒良;楊榆;;基于MVC架構(gòu)原理的電子文檔安全管控系統(tǒng)的設(shè)計與實現(xiàn)[A];第十九屆全國青年通信學(xué)術(shù)年會論文集[C];2014年
2 鄭國勤;沈文都;于貴友;張雷;王琳;;BIM及建筑CAD軟件中的圖形平臺技術(shù)研究[A];第十七屆全國工程建設(shè)計算機(jī)應(yīng)用大會論文集[C];2014年
相關(guān)碩士學(xué)位論文 前10條
1 姚明君;船舶分段合攏控制系統(tǒng)研究[D];湖北大學(xué);2013年
2 姚泰然;基于機(jī)器視覺的手機(jī)鏡片分揀系統(tǒng)研究[D];華中科技大學(xué);2013年
3 郭光;Web服務(wù)器上比例延遲保證的分散自校正控制方法[D];北京交通大學(xué);2014年
4 陳立鵬;南京地鐵自動售票機(jī)支付與找零子系統(tǒng)的設(shè)計與開發(fā)[D];南京理工大學(xué);2014年
5 王強(qiáng);信息實時備份平臺研究與實現(xiàn)[D];電子科技大學(xué);2013年
6 王雅;標(biāo)簽自動化制作軟件的設(shè)計與實現(xiàn)[D];北京工業(yè)大學(xué);2013年
7 喬超;實時腦機(jī)接口關(guān)鍵技術(shù)研究及系統(tǒng)實現(xiàn)[D];鄭州大學(xué);2014年
8 蘭勇;基于殼的軟件保護(hù)機(jī)制的研究與實現(xiàn)[D];西南石油大學(xué);2014年
9 舒波;基于OGRE的多視角裸眼立體顯示與渲染技術(shù)研究[D];浙江工業(yè)大學(xué);2014年
10 王尚飛;基于行為監(jiān)控的木馬檢測系統(tǒng)研究與實現(xiàn)[D];北京郵電大學(xué);2014年
本文編號:2302446
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2302446.html