首页> 外文OA文献 >Visualizing Spatial and Temporal Dynamics of a Class of IRC-Based Botnets
【2h】

Visualizing Spatial and Temporal Dynamics of a Class of IRC-Based Botnets

机译:可视化一类基于IRC的僵尸网络的时空动态

摘要

Botnets are a serious threat to the security of personal computers, businesses and even countries. They can launch attacks on remote systems and infrastructure, perform espionage and once installed they essentially hand over control of the computer to a botnet administrator. It is very difficult to detect their presence in a network as it is hard to distinguish their footprint from normal traffic. By using Internet Relay Chat (IRC)-based botnets as an example for visualizing spatial and temporal dynamics, I will attempt to detect the presence of a bot and visualize the results. Based on previous works for detecting malware, the choice was made to use process-to-port mapping as the base metric for visualization. Investigation into botnets was an integral part of the thesis. Published sources along with research into botnet administrator communities were used to provide a solid information base. A bot application, which is part of a botnet, can be regarded in the same way as any other piece of software, but with added functionality for communication and remote control. As such, it is bound by the same proprietary technologies. The thesis focuses on a method of detection that relies on IP and port pairs with host computer metrics, which can be expanded to a distributed context with the use of Simple Network Management Protocol (SNMP). The software for process-to-port mapping and visualization of a botnet has been developed with focus on geographical location. Use of geography for the Visualization application proved to be a good choice and communicating applications are shown in a distinct and clear way. Experiments conducted, successfully detected and visualized the bot communicating with the command and control server as metrics were collected on a host machine. The developed visualization software also shows general network activity and has potential to be used in a more general context. It is concluded that given some preconditions with regards to a bot s rootkit capabilities, detection of a botnet is successful. Given the availability of certain SNMP OIDs, it is possible to perform botnet detection and general network visualization in a large scale and distributed context.
机译:僵尸网络严重威胁个人计算机,企业乃至国家的安全。他们可以对远程系统和基础设施发起攻击,进行间谍活动,一旦安装,他们实际上会将对计算机的控制权移交给了僵尸网络管理员。由于很难将其足迹与正常流量区分开来,因此很难检测它们在网络中的存在。通过使用基于Internet中继聊天(IRC)的僵尸网络作为可视化空间和时间动态的示例,我将尝试检测僵尸程序的存在并可视化结果。基于先前检测恶意软件的工作,选择使用进程到端口的映射作为可视化的基本指标。对僵尸网络的调查是论文不可分割的一部分。已发布的资源以及对僵尸网络管理员社区的研究被用来提供坚实的信息基础。僵尸网络中的一个bot应用程序可以与任何其他软件一样使用,但具有通信和远程控制的附加功能。因此,它受相同的专有技术约束。本文重点研究一种依赖于IP和端口对以及主机指标的检测方法,该方法可以使用简单网络管理协议(SNMP)扩展到分布式上下文。已经开发了用于僵尸网络的过程到端口映射和可视化的软件,重点是地理位置。事实证明,将地理区域用于Visualization应用程序是一个不错的选择,并且以独特清晰的方式显示了通信应用程序。在主机上收集指标时,进行的实验,成功检测到并可视化了与命令和控制服务器通信的bot。所开发的可视化软件还显示了一般的网络活动,并有可能在更一般的情况下使用。结论是,给定关于bot的rootkit功能的一些前提条件,僵尸网络的检测是成功的。给定某些SNMP OID的可用性,可以在大规模和分布式环境中执行僵尸网络检测和常规网络可视化。

著录项

  • 作者

    Hegna Andreas;

  • 作者单位
  • 年度 2010
  • 总页数
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号