An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
碩士 === 國立交通大學 === 資訊管理研究所 === 96 === A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, t...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2008
|
Online Access: | http://ndltd.ncl.edu.tw/handle/91052046726627666219 |
id |
ndltd-TW-096NCTU5396018 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCTU53960182015-10-13T13:51:49Z http://ndltd.ncl.edu.tw/handle/91052046726627666219 An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study 一個基於模擬方法的多型網路蠕蟲偵測系統-以無線區域網路環境為例 Chiang Huang 黃強 碩士 國立交通大學 資訊管理研究所 96 A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, this research mainly concentrates on X86 IA32 platform. In current approaches, the speed of substring-signature-based detection is the fastest, but improvement of the false positive ratio still required. Static analysis signature system has a major problem with run-time code obfuscation, and Virtual machine Honeypot-based detection has traffic redirection problem. Thus, this research proposed novel approach to detect polymorphic network worms for defeating those weaknesses as previously mentioned. The objective of this research is to design an approach as follow: First, checking the signature of polymorphic decoder, find the entry point of decoder. Second, execute decoder and reform original worm attack payload. Third, according to attack payload execution behavior, the system discovered whether exists system call for networking usage. The approach proposed by this research has effectively eliminated high false positive. The conclusion as follows: (1) the false positive ration has reduced about average 15% comparing with existing signature system Polygraph in the best case. (2)Scanning packet for detecting decoder signature is recommended above MTU 512 bytes. (3)Filtering executable file in the network traffic effectively reduce 25% false positive than unfiltered. (4)The proposed system worked properly under packet fragmentation attack. Chi-Chun Lo 羅濟群 2008 學位論文 ; thesis 80 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立交通大學 === 資訊管理研究所 === 96 === A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, this research mainly concentrates on X86 IA32 platform. In current approaches, the speed of substring-signature-based detection is the fastest, but improvement of the false positive ratio still required. Static analysis signature system has a major problem with run-time code obfuscation, and Virtual machine Honeypot-based detection has traffic redirection problem. Thus, this research proposed novel approach to detect polymorphic network worms for defeating those weaknesses as previously mentioned. The objective of this research is to design an approach as follow: First, checking the signature of polymorphic decoder, find the entry point of decoder. Second, execute decoder and reform original worm attack payload. Third, according to attack payload execution behavior, the system discovered whether exists system call for networking usage. The approach proposed by this research has effectively eliminated high false positive. The conclusion as follows: (1) the false positive ration has reduced about average 15% comparing with existing signature system Polygraph in the best case. (2)Scanning packet for detecting decoder signature is recommended above MTU 512 bytes. (3)Filtering executable file in the network traffic effectively reduce 25% false positive than unfiltered. (4)The proposed system worked properly under packet fragmentation attack.
|
author2 |
Chi-Chun Lo |
author_facet |
Chi-Chun Lo Chiang Huang 黃強 |
author |
Chiang Huang 黃強 |
spellingShingle |
Chiang Huang 黃強 An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
author_sort |
Chiang Huang |
title |
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
title_short |
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
title_full |
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
title_fullStr |
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
title_full_unstemmed |
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study |
title_sort |
emulation-based detection system for detecting polymorphic network worms-using wlan as a case study |
publishDate |
2008 |
url |
http://ndltd.ncl.edu.tw/handle/91052046726627666219 |
work_keys_str_mv |
AT chianghuang anemulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy AT huángqiáng anemulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy AT chianghuang yīgèjīyúmónǐfāngfǎdeduōxíngwǎnglùrúchóngzhēncèxìtǒngyǐwúxiànqūyùwǎnglùhuánjìngwèilì AT huángqiáng yīgèjīyúmónǐfāngfǎdeduōxíngwǎnglùrúchóngzhēncèxìtǒngyǐwúxiànqūyùwǎnglùhuánjìngwèilì AT chianghuang emulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy AT huángqiáng emulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy |
_version_ |
1717744494647967744 |