首页> 外文会议>2014 IEEE 38th Annual International Computers, Software and Applications Conference >Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks
【24h】

Development of a Secure Traffic Analysis System to Trace Malicious Activities on Internal Networks

机译:开发安全的流量分析系统以跟踪内部网络上的恶意活动

获取原文
获取原文并翻译 | 示例

摘要

In contrast to conventional cyber attacks such as mass infection malware, targeted attacks take a long time to complete their mission. By using a dedicated malware for evading detection at the initial attack, an attacker quietly succeeds in setting up a front-line base in the target organization. Communication between the attacker and the base adopts popular protocols to hide its existence. Because conventional countermeasures deployed on the boundary between the Internet and the internal network will not work adequately, monitoring on the internal network becomes indispensable. In this paper, we propose an integrated sandbox system that deploys a secure and transparent proxy to analyze internal malicious network traffic. The adoption of software defined networking technology makes it possible to redirect any internal traffic from/to a suspicious host to the system for an examination of its insidiousness. When our system finds malicious activity, the traffic is blocked. If the malicious traffic is regarded as mandatory, e.g., For controlled delivery, the system works as a transparent proxy to bypass it. For benign traffic, the system works as a transparent proxy, as well. If binary programs are found in traffic, they are automatically extracted and submitted to a malware analysis module of the sandbox. In this way, we can safely identify the intention of the attackers without making them aware of our surveillance.
机译:与诸如大规模感染恶意软件之类的常规网络攻击相比,定向攻击需要很长时间才能完成其任务。通过使用专用恶意软件逃避初始攻击时的检测,攻击者悄悄地成功地在目标组织中建立了前线基地。攻击者与基地之间的通信采用流行的协议来掩盖其存在。由于部署在Internet和内部网络之间的边界上的常规对策无法充分发挥作用,因此对内部网络进行监视变得必不可少。在本文中,我们提出了一个集成的沙箱系统,该系统部署了安全透明的代理来分析内部恶意网络流量。采用软件定义的网络技术可以将来自/到可疑主机的任何内部流量重定向到系统,以检查其隐患。当我们的系统发现恶意活动时,流量将被阻止。如果恶意流量被认为是强制性的,例如,对于受控传递,系统将作为透明代理来绕过它。对于良性流量,该系统也可以用作透明代理。如果在流量中发现了二进制程序,则会自动提取它们并将其提交给沙盒的恶意软件分析模块。这样,我们可以安全地确定攻击者的意图,而无需使他们意识到我们的监视。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号