An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study

碩士 === 國立交通大學 === 資訊管理研究所 === 96 === A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, t...

Full description

Bibliographic Details
Main Authors: Chiang Huang, 黃強
Other Authors: Chi-Chun Lo
Format: Others
Language:zh-TW
Published: 2008
Online Access:http://ndltd.ncl.edu.tw/handle/91052046726627666219
id ndltd-TW-096NCTU5396018
record_format oai_dc
spelling ndltd-TW-096NCTU53960182015-10-13T13:51:49Z http://ndltd.ncl.edu.tw/handle/91052046726627666219 An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study 一個基於模擬方法的多型網路蠕蟲偵測系統-以無線區域網路環境為例 Chiang Huang 黃強 碩士 國立交通大學 資訊管理研究所 96 A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, this research mainly concentrates on X86 IA32 platform. In current approaches, the speed of substring-signature-based detection is the fastest, but improvement of the false positive ratio still required. Static analysis signature system has a major problem with run-time code obfuscation, and Virtual machine Honeypot-based detection has traffic redirection problem. Thus, this research proposed novel approach to detect polymorphic network worms for defeating those weaknesses as previously mentioned. The objective of this research is to design an approach as follow: First, checking the signature of polymorphic decoder, find the entry point of decoder. Second, execute decoder and reform original worm attack payload. Third, according to attack payload execution behavior, the system discovered whether exists system call for networking usage. The approach proposed by this research has effectively eliminated high false positive. The conclusion as follows: (1) the false positive ration has reduced about average 15% comparing with existing signature system Polygraph in the best case. (2)Scanning packet for detecting decoder signature is recommended above MTU 512 bytes. (3)Filtering executable file in the network traffic effectively reduce 25% false positive than unfiltered. (4)The proposed system worked properly under packet fragmentation attack. Chi-Chun Lo 羅濟群 2008 學位論文 ; thesis 80 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立交通大學 === 資訊管理研究所 === 96 === A polymorphic worm detection approach using WLAN as a case study was proposed in this research. The platform issues profoundly affect worm attack, and nowadays real network worms primary targets at in Intel Architecture 32-bit platforms. To solve real problems, this research mainly concentrates on X86 IA32 platform. In current approaches, the speed of substring-signature-based detection is the fastest, but improvement of the false positive ratio still required. Static analysis signature system has a major problem with run-time code obfuscation, and Virtual machine Honeypot-based detection has traffic redirection problem. Thus, this research proposed novel approach to detect polymorphic network worms for defeating those weaknesses as previously mentioned. The objective of this research is to design an approach as follow: First, checking the signature of polymorphic decoder, find the entry point of decoder. Second, execute decoder and reform original worm attack payload. Third, according to attack payload execution behavior, the system discovered whether exists system call for networking usage. The approach proposed by this research has effectively eliminated high false positive. The conclusion as follows: (1) the false positive ration has reduced about average 15% comparing with existing signature system Polygraph in the best case. (2)Scanning packet for detecting decoder signature is recommended above MTU 512 bytes. (3)Filtering executable file in the network traffic effectively reduce 25% false positive than unfiltered. (4)The proposed system worked properly under packet fragmentation attack.
author2 Chi-Chun Lo
author_facet Chi-Chun Lo
Chiang Huang
黃強
author Chiang Huang
黃強
spellingShingle Chiang Huang
黃強
An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
author_sort Chiang Huang
title An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
title_short An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
title_full An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
title_fullStr An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
title_full_unstemmed An Emulation-based Detection System for Detecting Polymorphic Network Worms-Using WLAN as A Case Study
title_sort emulation-based detection system for detecting polymorphic network worms-using wlan as a case study
publishDate 2008
url http://ndltd.ncl.edu.tw/handle/91052046726627666219
work_keys_str_mv AT chianghuang anemulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy
AT huángqiáng anemulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy
AT chianghuang yīgèjīyúmónǐfāngfǎdeduōxíngwǎnglùrúchóngzhēncèxìtǒngyǐwúxiànqūyùwǎnglùhuánjìngwèilì
AT huángqiáng yīgèjīyúmónǐfāngfǎdeduōxíngwǎnglùrúchóngzhēncèxìtǒngyǐwúxiànqūyùwǎnglùhuánjìngwèilì
AT chianghuang emulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy
AT huángqiáng emulationbaseddetectionsystemfordetectingpolymorphicnetworkwormsusingwlanasacasestudy
_version_ 1717744494647967744