【24h】

USB Rubber Ducky Detection by using Heuristic Rules

机译:使用启发式规则USB橡胶Ducky检测

获取原文

摘要

With the rise in tightening of the Cybersecurity rules and policies implemented by the corporate houses, the work that malicious hackers need to do to compromise a system has risen exponentially. A significant part of a hacker's work goes into the bypassing of the firewalls and intrusion into the main systems. A comparatively easy way to bypass all systems is USB rubber ducky, which is a simple USB stick that impersonates a keyboard by changing its hardware ID and thus executing commands as if a user was manually typing them. This attack has proved to exploit the least proficient part of cyber-defense that is humans. In this research paper, we discuss a utility that can easily detect malicious USB by using heuristic checks. This utility, named ducky-detector, can easily segregate keyboard input by finding the discrepancies that arise due to the automated functioning of the USB rubber ducky device. Ducky-Detector has proved to out-smarten all the present solutions to this problem with almost perfect accuracy, no false positives, and really low computational power required. Ducky detector has been tested against a wide variety of commercial and free Antivirus software with variable payloads, thus simulating a real-life scenario where payloads can vary to any extent. Ducky-detector induces a mere 0.9% overhead on a Linux distribution system.
机译:随着公司房屋实施的网络安全规则和政策的收紧,恶意黑客需要妥协一个系统的工作已经呈指数增长。黑客工作的重要部分进入了防火墙和入侵到主要系统。绕过所有系统的相对简单的方法是USB橡胶Ducky,这是一个简单的USB棒,它通过改变其硬件ID来模拟键盘,从而执行命令,就像用户手动键入它们一样。这次攻击已经证明,利用人类的网络防守部分最不精通部分。在本研究论文中,我们讨论了一种可以通过使用启发式检查来容易地检测恶意USB的实用程序。这种名为Ducky探测器的实用程序可以通过找到由于USB橡胶鸭装置的自动运作而产生的差异来轻松隔离键盘输入。 Ducky探测器已经证明,以几乎完美的准确性,没有误报,并且需要低计算能力,从而为此问题进行了所有目前的所有解决方案。 Ducky探测器已经针对具有可变有效载荷的各种商业和免费防病毒软件进行了测试,从而模拟了有效载荷可以在任何程度上变化的现实生活场景。 Ducky探测器在Linux分配系统上诱导0.9%开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号