A Novel Behavior-Based Solution to Backdoors
碩士 === 國立中央大學 === 資訊工程研究所 === 96 === With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/01786159035394498579 |
id |
ndltd-TW-096NCU05392098 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-096NCU053920982015-11-25T04:04:57Z http://ndltd.ncl.edu.tw/handle/01786159035394498579 A Novel Behavior-Based Solution to Backdoors 一個以TCP連線行為基礎來防禦後門程式的機制 Chun-yu Chen 陳俊佑 碩士 國立中央大學 資訊工程研究所 96 With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal benefit. Like rootkit, spyware, or spamware, these malwares spread via all kinds of network applications. It is a huge threat to Internet and system security. In order to control the victim computers, open the backdoor is the most important step in all attacking methods. The conventional Trojan house and backdoor may mask themselves as normal programs, like having the same name with normal program, in order to cheat users. Once attackers get the backdoor process with root privilege, attackers can do everything to the victim. In this thesis, we propose a new behavior-based defensive mechanism to detect whether a program is a backdoor or not. This mechanism can protect system from controlling by backdoor. We can find out the backdoor before the system information is sent by Internet abnormally. Before the attack succeeds, we can terminate the suspicious process and stop the follow-up malicious activities in advanced. This mechanism can raise the security level of system and network server. Fu-hau Hsu 許富皓 學位論文 ; thesis 46 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊工程研究所 === 96 === With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal benefit. Like rootkit, spyware, or spamware, these malwares spread via all kinds of network applications. It is a huge threat to Internet and system security.
In order to control the victim computers, open the backdoor is the most important step in all attacking methods. The conventional Trojan house and backdoor may mask themselves as normal programs, like having the same name with normal program, in order to cheat users. Once attackers get the backdoor process with root privilege, attackers can do everything to the victim.
In this thesis, we propose a new behavior-based defensive mechanism to detect whether a program is a backdoor or not. This mechanism can protect system from controlling by backdoor. We can find out the backdoor before the system information is sent by Internet abnormally. Before the attack succeeds, we can terminate the suspicious process and stop the follow-up malicious activities in advanced. This mechanism can raise the security level of system and network server.
|
author2 |
Fu-hau Hsu |
author_facet |
Fu-hau Hsu Chun-yu Chen 陳俊佑 |
author |
Chun-yu Chen 陳俊佑 |
spellingShingle |
Chun-yu Chen 陳俊佑 A Novel Behavior-Based Solution to Backdoors |
author_sort |
Chun-yu Chen |
title |
A Novel Behavior-Based Solution to Backdoors |
title_short |
A Novel Behavior-Based Solution to Backdoors |
title_full |
A Novel Behavior-Based Solution to Backdoors |
title_fullStr |
A Novel Behavior-Based Solution to Backdoors |
title_full_unstemmed |
A Novel Behavior-Based Solution to Backdoors |
title_sort |
novel behavior-based solution to backdoors |
url |
http://ndltd.ncl.edu.tw/handle/01786159035394498579 |
work_keys_str_mv |
AT chunyuchen anovelbehaviorbasedsolutiontobackdoors AT chénjùnyòu anovelbehaviorbasedsolutiontobackdoors AT chunyuchen yīgèyǐtcpliánxiànxíngwèijīchǔláifángyùhòuménchéngshìdejīzhì AT chénjùnyòu yīgèyǐtcpliánxiànxíngwèijīchǔláifángyùhòuménchéngshìdejīzhì AT chunyuchen novelbehaviorbasedsolutiontobackdoors AT chénjùnyòu novelbehaviorbasedsolutiontobackdoors |
_version_ |
1718136521697001472 |