Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention
碩士 === 國立臺灣大學 === 電機工程學研究所 === 107 === In this Internet era, cyber attacks happen every second. The safety of network environments rely more and more on firewalls, intrusion prevention systems and intrusion detection systems. Noteable products include Amazon’s CloudFront and the popular Web Applica...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/95ca43 |
id |
ndltd-TW-107NTU05442055 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107NTU054420552019-11-16T05:27:58Z http://ndltd.ncl.edu.tw/handle/95ca43 Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention 分散式系統之防禦偵測方法設計與實作 Shi-Kai Huang 黃詩凱 碩士 國立臺灣大學 電機工程學研究所 107 In this Internet era, cyber attacks happen every second. The safety of network environments rely more and more on firewalls, intrusion prevention systems and intrusion detection systems. Noteable products include Amazon’s CloudFront and the popular Web Application Firewall product ModSecurity. These defense products usually have some security blind spots. When they detect malicious requests, they often directly block the source IP address to prevent further attacks. Such a method is not the best way for defensing cyber attack, because the attacker might be able to bypass the above defense systems. In this thesis, we will introduce a better system testing method and implement a testing framework for detecting previous blacklist bypassing problems. It will use a better scanning method to test the IP-based blacklist defense products, and this framework will automatically create lots of cloud instances to dodge the detection from Amazon EC2 or Google GCP, and so on. This method can confuse a WAF/IDS detection mechanism and it can speed up the scanning time and promote the coverage rate. In the past, researchers usually use rule-based methods to bypass a WAF/IDS detection mechanism. But when WAF/IDS rules become stronger, these methods will become useless for pentesters or researchers. As many companies do not have enough resources to build a huge testing environment to test their products, our goal is to introduce a frugal and faster method and algorithm to find vulnerabilities in their products. 顏嗣鈞 2019 學位論文 ; thesis 68 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣大學 === 電機工程學研究所 === 107 === In this Internet era, cyber attacks happen every second. The safety of network environments rely more and more on firewalls, intrusion prevention systems and intrusion detection systems. Noteable products include Amazon’s CloudFront and the popular Web Application Firewall product ModSecurity. These defense products usually have some security blind spots. When they detect malicious requests, they often directly block the source IP address to prevent further attacks. Such a method is not the best way for defensing cyber attack, because the attacker might be able to bypass the above defense systems.
In this thesis, we will introduce a better system testing method and implement a testing framework for detecting previous blacklist bypassing problems. It will use a better scanning method to test the IP-based blacklist defense products, and this framework will automatically create lots of cloud instances to dodge the detection from Amazon EC2 or Google GCP, and so on. This method can confuse a WAF/IDS detection mechanism and it can speed up the scanning time and promote the coverage rate.
In the past, researchers usually use rule-based methods to bypass a WAF/IDS detection mechanism. But when WAF/IDS rules become stronger, these methods will become useless for pentesters or researchers. As many companies do not have enough resources to build a huge testing environment to test their products, our goal is to introduce a frugal and faster method and algorithm to find vulnerabilities in their products.
|
author2 |
顏嗣鈞 |
author_facet |
顏嗣鈞 Shi-Kai Huang 黃詩凱 |
author |
Shi-Kai Huang 黃詩凱 |
spellingShingle |
Shi-Kai Huang 黃詩凱 Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
author_sort |
Shi-Kai Huang |
title |
Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
title_short |
Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
title_full |
Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
title_fullStr |
Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
title_full_unstemmed |
Design and Implementation of a Distributed Architecture for Vulnerability Scanning and Intrusion Prevention |
title_sort |
design and implementation of a distributed architecture for vulnerability scanning and intrusion prevention |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/95ca43 |
work_keys_str_mv |
AT shikaihuang designandimplementationofadistributedarchitectureforvulnerabilityscanningandintrusionprevention AT huángshīkǎi designandimplementationofadistributedarchitectureforvulnerabilityscanningandintrusionprevention AT shikaihuang fēnsànshìxìtǒngzhīfángyùzhēncèfāngfǎshèjìyǔshízuò AT huángshīkǎi fēnsànshìxìtǒngzhīfángyùzhēncèfāngfǎshèjìyǔshízuò |
_version_ |
1719292399704866816 |