- 1、本文档共19页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A Case Study on Storm Worm
Search Activity Publish Activity in Stormnet * Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm WormT. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling - Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET08), 2008. Reporter: 高嘉男 Advisor: Chin-Laung Lei 2009/08/04 * Outline Introduction Botnet tracking adapted tp P2P botnets Class of botnets considered Botnet tracking extended Inside Storm Worm Propagation mechanism Network-level behavior Case study: tracking Storm Worm Conclusion * Introduction IRC based botnet Botnet tracking Acquire and analyze a copy of a bot Infiltrate the botnet Identify the central IRC server P2P botnet Storm Worm * Class of Botnets Considered Unauthenticated content-based publish/subscribe style communication Peer-to-peer network architecture Content-based publish/subscribe-style communication Unauthenticated communication * Botnet Tracking Extended Step 1: Exploiting the P2P bootstrapping process Getting hold of a bot by honetpot Step 2: Infiltration and analysis Join the botnet to retrieve connection information Step 3: Mitigation Can’t send information directly * Propagation Mechanism of Storm Worm Similar to mail worms Spamtraps: e-mail addresses not used for communication but to lure spam e-mails Client honeypots to exam the links Only webbrowers with a specific HTTP request header field will be exploited Send different exploits to install a copy of the Storm binary The exploit code changes periodically The binary itself is also polymorphic * Routing Lookup OVERNET and Stormnet DHT ID: randomly generated 128 bit ID XOR-distance: d (a ,b) = a ? b Query from a to b: To the node in its routing table that has the smallest XOR-distance with b Route requests to three peers Route responses containing new peers even closer to the DHT ID of b * Publishing and Searching Key: an identifier used to retrieve information A key is published on twenty different p
您可能关注的文档
- 护理专业必威体育精装版名解.doc
- 护理专业毕业论文引流.doc
- 护理专业病理学考卷.doc
- 护理专业社区护理方向《社区护理学》教学大纲.doc
- 护理专业集中实践环节大纲附表.doc
- 护理习题MicrosoftWord文档.doc
- 护理人员岗位制度.doc
- 护理人员岗位服务规范.doc
- 护理作业标准正文.doc
- 护理依赖程度和护理级别1.doc
- 2024-2025学年人教版小学数学四年级下册教学计划及进度表.docx
- 2024-2025学年北师大版小学数学二年级下册教学计划及进度表.docx
- 2024-2025学年人教版小学数学五年级下册教学计划及进度表.docx
- 2024-2025学年人教大同版(2024)小学英语三年级下册教学计划.docx
- 2024-2025学年人教精通版(三起)(2024)小学英语三年级下册教学计划.docx
- 2024-2025学年统编版初中道德与法治八年级下册教学计划及进度表.docx
- 2024-2025学年统编版(2024)初中道德与法治七年级下册教学计划及进度表.docx
- 2023-2024学年上海黄埔区中考二模综合测试(物理部分)试卷及答案.pdf
- 2024-2025学年外研版(三起)(2024)小学英语三年级下册教学计划及进度表.docx
- 2025届北京市北京第四中学高三冲刺模拟数学试卷含解析.doc
文档评论(0)