A Novel Behavior-Based Solution to Backdoors

碩士 === 國立中央大學 === 資訊工程研究所 === 96 === With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal...

Full description

Bibliographic Details
Main Authors: Chun-yu Chen, 陳俊佑
Other Authors: Fu-hau Hsu
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/01786159035394498579
id ndltd-TW-096NCU05392098
record_format oai_dc
spelling ndltd-TW-096NCU053920982015-11-25T04:04:57Z http://ndltd.ncl.edu.tw/handle/01786159035394498579 A Novel Behavior-Based Solution to Backdoors 一個以TCP連線行為基礎來防禦後門程式的機制 Chun-yu Chen 陳俊佑 碩士 國立中央大學 資訊工程研究所 96 With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal benefit. Like rootkit, spyware, or spamware, these malwares spread via all kinds of network applications. It is a huge threat to Internet and system security. In order to control the victim computers, open the backdoor is the most important step in all attacking methods. The conventional Trojan house and backdoor may mask themselves as normal programs, like having the same name with normal program, in order to cheat users. Once attackers get the backdoor process with root privilege, attackers can do everything to the victim. In this thesis, we propose a new behavior-based defensive mechanism to detect whether a program is a backdoor or not. This mechanism can protect system from controlling by backdoor. We can find out the backdoor before the system information is sent by Internet abnormally. Before the attack succeeds, we can terminate the suspicious process and stop the follow-up malicious activities in advanced. This mechanism can raise the security level of system and network server. Fu-hau Hsu 許富皓 學位論文 ; thesis 46 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊工程研究所 === 96 === With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal benefit. Like rootkit, spyware, or spamware, these malwares spread via all kinds of network applications. It is a huge threat to Internet and system security. In order to control the victim computers, open the backdoor is the most important step in all attacking methods. The conventional Trojan house and backdoor may mask themselves as normal programs, like having the same name with normal program, in order to cheat users. Once attackers get the backdoor process with root privilege, attackers can do everything to the victim. In this thesis, we propose a new behavior-based defensive mechanism to detect whether a program is a backdoor or not. This mechanism can protect system from controlling by backdoor. We can find out the backdoor before the system information is sent by Internet abnormally. Before the attack succeeds, we can terminate the suspicious process and stop the follow-up malicious activities in advanced. This mechanism can raise the security level of system and network server.
author2 Fu-hau Hsu
author_facet Fu-hau Hsu
Chun-yu Chen
陳俊佑
author Chun-yu Chen
陳俊佑
spellingShingle Chun-yu Chen
陳俊佑
A Novel Behavior-Based Solution to Backdoors
author_sort Chun-yu Chen
title A Novel Behavior-Based Solution to Backdoors
title_short A Novel Behavior-Based Solution to Backdoors
title_full A Novel Behavior-Based Solution to Backdoors
title_fullStr A Novel Behavior-Based Solution to Backdoors
title_full_unstemmed A Novel Behavior-Based Solution to Backdoors
title_sort novel behavior-based solution to backdoors
url http://ndltd.ncl.edu.tw/handle/01786159035394498579
work_keys_str_mv AT chunyuchen anovelbehaviorbasedsolutiontobackdoors
AT chénjùnyòu anovelbehaviorbasedsolutiontobackdoors
AT chunyuchen yīgèyǐtcpliánxiànxíngwèijīchǔláifángyùhòuménchéngshìdejīzhì
AT chénjùnyòu yīgèyǐtcpliánxiànxíngwèijīchǔláifángyùhòuménchéngshìdejīzhì
AT chunyuchen novelbehaviorbasedsolutiontobackdoors
AT chénjùnyòu novelbehaviorbasedsolutiontobackdoors
_version_ 1718136521697001472