以入侵偵測系統為基礎

Similar documents
<4D F736F F F696E74202D FC2B2B3F85FA44AAB49B0BBB4FABB50B977A8BEA874B2CEC2B2A4B6BB50C0B3A5CE2E707074>

C6_ppt.PDF

R3105+ ADSL

Symantec™ Sygate Enterprise Protection 防护代理安装使用指南

epub 61-2

Microsoft PowerPoint - 02_crime_security.pptx

Data Server_new_.doc

ARP ICMP

F4

untitled

<B1B1BEA9B9E2BBB7D0C2CDF8BFC6BCBCB9C9B7DDD3D0CFDEB9ABCBBEB4B43F3F12FB6CB293>

財金資訊-80期.indd

UDP 8.2 TCP/IP OSI OSI 3 OSI TCP/IP IP TCP/IP TCP/IP Transport Control Protocol TCP User Datagram Protocol UDP TCP TCP/IP IP TCP TCP/IP TC


9 Internet 10 Internet

NetST 2300系列防火墙产品白皮书


的 開 銷, 請 務 必 先 和 家 裡 討 論 後 再 做 決 定 二 研 修 學 校 簡 介 卡 內 基 美 隆 大 學 (Carnegie Mellon University), 位 於 賓 州 匹 茲 堡 會 選 擇 來 這 裡 交 換, 我 相 信 大 部 分 的 人 都 已 經 知 道

经华名家讲堂

Web

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

SEC-220

SiteView技术白皮书

資訊戰與數位鑑識

Chapter #


计算机网络概论

温州市政府分散采购

LAMP system and relative tools like SNMP, Expect, Nmap, etc. to build a cross- platform, lo

第 11 章 互聯網技術 11.1 互聯 網 和 萬 維 網 的 發 展 歷 史 A. 互聯網的發展 互聯網是由 ARPANET 開 始發展的 1969 年 美國國防部高級研究計劃署 (ARPA) 把部分軍事研究所和大 的電腦連接起來 建造了㆒個實驗性的電腦網絡 稱為 ARPANET 並 列 的功能

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

C3_ppt.PDF

2015绿盟科技DDoS威胁报告

1 Linux Linux Linux Windows NT Linux Linux UNIX Internet Linux Internet Internet Web Linux 26.3% Web Apache 60% Sendmail Internet Linux ISP/ICP

Total Internet Connectivity in a Single Chip

ebook140-11

目 標 評 核 項 目 中 央 研 究 院 102 年 總 辦 事 處 計 算 中 心 績 效 評 比 報 告 執 行 績 效 ( 含 設 定 目 標 之 複 雜 度 及 挑 戰 性 目 標 達 成 度 實 際 成 效 ) 共 同 性 評 核 項 目 一 行 政 效 能 ( 一 ) 建 置 本 院

Microsoft PowerPoint - 数据通信-ch1.ppt

TCP/IP TCP/IP OSI IP TCP IP IP TCP/IP TCP/IP

.. 3 N

IP505SM_manual_cn.doc


第1章 QBASIC语言概述

Mechanical Science and Technology for Aerospace Engineering October Vol No. 10 Web SaaS B /S Web2. 0 Web2. 0 TP315 A

Microsoft Word - YDB Vehicle Telematics Service Requirement and General Framework

ClientHelpSymantec™ Endpoint Protection 及 Symantec Network Access Control 客户端指南

1. ( B ) IT (A) (B) (C) (D) 2. ( A ) (A) (B) (C) (D) 3. ( B ) (A) GPS (B) GIS (C) ETC (D) CAI 4. ( D ) (A) (B) (C) (D) 5. ( B ) (Stored Program) (A) H

杭 州 顺 网 科 技 股 份 有 限 公 司 拟 实 施 股 权 收 购 涉 及 江 苏 国 瑞 信 安 科 技 有 限 公 司 股 权 评 估 项 目 资 产 评 估 报 告 目 录 杭 州 顺 网 科 技 股 份 有 限 公 司 拟 实 施 股 权 收 购 涉 及 的 江 苏 国 瑞 信 安

清华得实WebST网络安全行业解决方案

Microsoft Word htm

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库

<4D F736F F D20312D3120B9ABBFAAD7AAC8C3CBB5C3F7CAE9A3A8C9EAB1A8B8E5A3A92E646F63>

ASP 電子商務網頁設計

发行说明, 版

目 彔 1. 准 备 工 作 登 彔 设 置 功 能 说 明 实 时 监 控 基 本 控 制 功 能 设 置 画 质 调 节 彔 像 与 抓 拍

XXXXXXXX

ebook140-9

前言

软件测试(TA07)第一学期考试

untitled

研究生平台使用指导书.doc

ebook204-2

目录

第3章 计算机网络体系结构

網路安全:理論與實務 第二版

1.1 OfficeScan OfficeScan V5.02 SOP OfficeScan HTTP-based Windows NT/Windows Intel Pentium II 233 MHz 64 MB 200 MB 640 x Wi

填 写 要 求 一 以 word 文 档 格 式 如 实 填 写 各 项 二 表 格 文 本 中 外 文 名 词 第 一 次 出 现 时, 要 写 清 全 称 和 缩 写, 再 次 出 现 时 可 以 使 用 缩 写 三 涉 密 内 容 不 填 写, 有 可 能 涉 密 和 不 宜 大 范 围 公

XML XML XMPP XML XML Schema XML XML,,, XML,

ebook140-8

User Group SMTP

untitled

WP TW_APJISTR11.qxd

06 C H A P T E R 6-1 WWW 6-2 WWW WWW WWW

<4D F736F F D D352DBED6D3F2CDF8D7E9BDA8D3EBB9DCC0EDCFEEC4BFBDCCB3CCD5FDCEC42E646F63>

untitled

中文朗科AirTrackTM T600 迷你无线路由器用户手册.doc

在地的網路禮物文化

1

高 职 计 算 机 类 优 秀 教 材 书 目 * 序 号 书 号 (ISBN) 书 名 作 者 定 价 出 版 / 印 刷 日 期 ** 配 套 资 源 页 码 计 算 机 基 础 课 计 算 机 应 用 基 础 刘 升 贵 年 8 月

ebook2-1

網站安全

untitled

Microsoft Word - A doc

(Microsoft Word - \261M\256\327\272\353\302\262\263\370\247iEnd.doc)

工程师培训

飞鱼星多WAN防火墙路由器用户手册

ebook 145-6

全 国 高 等 职 业 教 育 规 划 教 材 21 世 纪 高 职 高 专 规 划 教 材 系 列 高 等 职 业 教 育 计 算 机 专 业 规 划 教 材 选 题 征 集 通 知 一 选 题 范 围 ( 不 仅 限 于 此 ) 选 题 方 向 选 题 名 计 算 机 基 础 计 算 机 应 用

Simulator By SunLingxi 2003

Microsoft Word - A doc

untitled

BYOD IP+Optical (IP NGN) API 4. End-to-End (Service Aware) 5. IP NGN (IP Next Generation Network) ( ) Prime Carrier Management Access Edge Co

目 錄 第 一 章 weberp 簡 介... 6 第 一 節 概 述... 6 第 二 節 安 全 性... 7 第 三 節 功 能... 7 一 銷 售 及 訂 單... 7 二 稅... 8 三 應 收 帳 款... 8 四 存 貨... 8 五 購 買... 9 六 應 付 帳 款... 9

27 :OPC 45 [4] (Automation Interface Standard), (Costom Interface Standard), OPC 2,,, VB Delphi OPC, OPC C++, OPC OPC OPC, [1] 1 OPC 1.1 OPC OPC(OLE f

iGENUS爱琴思邮件系统技术白皮书

Microsoft Word htm

Chap6.ppt

(CIP) Web /,. :, ISBN X.W T P393.4 CIP (2004) Web ( ) ( / ) : * 787

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

A API Application Programming Interface 见 应 用 程 序 编 程 接 口 ARP Address Resolution Protocol 地 址 解 析 协 议 为 IP 地 址 到 对 应 的 硬 件 地 址 之 间 提 供 动 态 映 射 阿 里 云 内

Transcription:

An Intrusion Detection System for Automatic Web Page Content Filtering and Blocking

i

URL ii

Abstract Today the network is widely used to transmit information and link resources. However, there are many malicious activities under the network environment. For example, Worms, Spy software, Hackers and Trojan horse programs can be used to attack a computer or steal data from a computer. Hence, security management plays an important role in today s network management tasks. Although, many companies use firewalls to defense the attacks from outside, but it can t ensure the security of the whole computers inside the firewalls. That is, we need a real time intrusion detection system to assist the firewalls. In this paper, we present a flexible, intrusion detection system for the automatic content filtering and blocking of web pages. That is, using our system the users can be protected from the attacks of computer viruses or Trojan horses resides in web pages. Our system may also be used to block improper information, such as pornography from webs. KeywordsIntrusion Detection, Network Security. iii

..... 1 1.1. 1 1.2..... 2 1.3..... 3.....4 2.1..... 4 2.1.1...... 4 2.1.2...... 6 2.1.3...... 7 2.1.4......8 2.2 Snort 9 2.2.1 Snort.........9 2.2.2 Snort 10 2.2.3..........11 2.2.4 Snort.... 13 2.2.5 Snort.......... 16 2.3. 18 2.3.1............18 2.3.2...19 2.3.3.. 20 2.4.21 2.4.1...... 21 2.4.2..23 iv

2.4.3....24 2.4.4........ 25 2.4.5........ 27...........30 3.1.... 31 3.2........ 33 3.3.... 34........ 36 4.1....... 36 4.2.... 38........ 43..... 45 v

2.1....5 2.2....6 2.3 Snort..10 2.4 Snort...... 13 2.5 Snort Rule Tree.....14 2.6 Snort Decode Structure.....15 2.7 Snort s Detection Engine.......16 2.8......18 2.9 TCP/IP SYN.....22 2.10 DDoS......23 2.11.....28 3.1 IDS 31 3.2...32 3.3 URL..32 3.4........ 35 vi

4.1 URL. 36 4.2 snort...... 4.3 snort URL...39 4.4.......40 4.5.... 41 vii

(Internet) (Worm (DoS, Denial of Service Attack) [1] (Hacker) (Virus) (Backdoor) (Network Security) (IDS, Intrusion Detection System) (Firewall) (Application Layer) (Backdoor) (Web Server) 1

1 2 3 4 Web Service (IDS, Intrusion Detection System) (Alert) (Firewall) (Network Layer) (Transport Layer) (Application Layer) IP Session (Proxy Server) 2

3

(Internet) (Firewall) [2] 爲 (Anomaly Detection System)[3] (Misuse Detection System)[4] (log) 4

(logs) (checksum hash, digital signature) (port) 5

[5] [6] (Packet) 6

(Packet) [6] (Misuse Detection system) (Signature-based Detection) (Signature) (Signature Matching) (False Positive, False 7

Alert) [9 (Anomaly Detection System) [3] (Neural Network)[12] [9] (False Positive, False Alert) 8

Snort (IDS, Intrusion Detection System) 1 2 3 4 Snort Snort [10] (open source) Snort Libpcap (Misuse Detection) (Rule-based) CGI SMB DDoS Snort (log) yslog (Misuse) 9

(False Positive)Snort (Plug-Ins) Snort Snort 2.3 2.3 Snort (Packet Capture and Packet Decoder) TCP/IP Libpcap (Detection Engine)Snort (Linking Structure) 10

/ (Logging and Alerting Subsystem) TCPDUMP Syslog Snort 産 Snort (Packet) [11] 産 1 (Protocol Match)Snort IP/TCP/UDP/ICMP TCP (flag) TCP TCP F ( FIN)S ( SYN)R( RESET)P( PUSH)A( ACK)U( URGENT) Snort alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"scan SYN FIN";flags:SF,12; reference:arachnids,198; classtype:attempted-recon; sid:624; rev:2;) flags TCP 2 (Signature Match) 11

Snort alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"web-client readme.eml download attempt"; flow:from_client,established; uricontent:"/readme.eml"; nocase; classtype:attempted-user; sid:1284; reference:url,www.cert.org/advisories/ca-2001-26.html; rev:9;) /readme.eml Snort (Preprocessors) Fragment Reassembly (fragmentation) 3 Snort alert tcp $EXTERNAL_NET any -> $HOME_NET 3372 (msg:"dos MSDTC attempt"; flow:to_server,established; dsize:>1023; reference:bugtraq,4006; classtype:attempted-dos; sid:1408; rev:5;) dsize 1023 麽 4 5 ( ) 産 IP1 100CGI 麽 CGI 12

Snort Snort [12] [13] Snort (Preprocessors Plug-ins (Output Plug-ins) (Keywords) (Rule Parser) 2.5 [12]Snort (Rule Set) RTN(Rule Tree Nod RTN OTN(Optional Tree Nod PcapLoop 13

2.5 Snort Rule Tree (Reassembling Packets) (Decoding protocols) (Nonrule or Protocol anomaly-based detectio) stream4 frag 2.6 14

Snort Decode Structure [12] nort Packet Rule Tree Nod Rule Tree Nod Optional Tree Nod 2.7 Snort s Detection Engine 2.6 Snort Decode Structure Snort 15

SnortDDoS 2.7Snort s Detection Engine Snort (Rule) (Log) Snort 爲 (Rule Header) (Rule Options) Action Protocol SourceIP Port DestinationIP Port ( Option ) Rule Header Rule Option 16

(Rule Action) (Protocol) (source)ip (port) (destination)ip Rule Action PassLogAlertDynamic Activate ICMP TCPIP UDP Snort log udp any any -> $HOME_NET 4120 4120 UDP msglogtottliddsizecontenturicontentoffset depthnocaseflagsseqacksessionflowpriorityicodeitypereference classtypesidrev Snort content "javascript\:// alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"web-client Javascript URL host spoofing attempt"; flow:to_client,established; content:"javascript\://"; nocase; classtype:attempted-user; reference:bugtraq,5293; sid:1841; rev:3;) Snort IP Snort 17

Proxy Server 2.8 (Browser) 18

(Web Server) (Web Page Cache 1 request 2 6 3 4 5 6 19

1 (Caching) 2 (Protocol Handling) (Hyper Text Transfer Protocol) (File Transfer Protocol) ICP(Internet Cache Protocol) URL(Uniform Resource Location) 3 (Garbage Collection 4 (Filtering 5 (Monitoring 20

6 (Access Control (Hacking) (Denial of Service attack) (Denial of Service AttackDOS) 1TCP SYN Flooding (Source IP) (Server) (TCP SYN) 21

SYN+ACK (ACK) TCP (Three-Way Handshake) 2.9 ACK SYN 2.9TCP SYN 2 (Distributed Denial of Service, DDoS) DoS 2.10 DoS Agent (DoS Agent) 3UDP Flood DoS UDP 22

(connectionless) UDP (port) 7(Echo service ) DDoS 4ICMP DoS ICMP ICMP ICMP Ping of Death Ping Ping of Death TCP/IP Ping TCP/IP 65,536 Bytes) (Buffer Overflow attack) 23

80 100 100 System bug and hole Snort http 24

HTTP (Unicode) ASCII ASCII 7 IIS 4.0 5.0 %c1%1c %c0%2f http://192.168.0.1/scripts/..%c1%1c../winnt/system32/cmd.exe?/c+dir + (Double encod URL "/" %255 %255 %5 "/" IIS (flip slas (IIS) \ / "\" "/" (Full whitespace) Apache (tab) (space) (5) (Internal alert HTTP CONNECT DELETE, GET, HEAD, OPTIONS, POST, PUT, TRACE HTTP 10 HTTP Malicious Code 25

(Virus) (Worm) (Trojan horse (Mellisa) Word Normal.dot Outlook ExploreZip 2001 (Code Red) (Hacker) (IIS Server (Nimda) (1) IIS HTMHTMLASP JavaScript readme.eml (2).eml 26

Outlook readme.eml local cookie data (Trojan Horse) JavaJavaScript Activex (format) HTML Java AppletJavaScript 2.11 27

2.11 [15] (port) (client programs) FTP FTP 28

.exe.dll 29

(log file) ( Snort) IP URL Snort Proxy_filter Snort URL 30

(Layer 4) http URL URL 3.1 IDS 31

3.2 URL 32

Snort http URL spo_proxy_filter URL Proxy URL Reject (Rule set) Web Client (Rule Subset web-client.rule multimedia.rulesporn.rules proxy_filter alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"web-client readme.eml autoload attempt"; flow:to_client,established; content:"window.open(\"readme.eml\""; nocase; classtype:attempted-user; sid:1290; reference:url,www.cert.org/advisories/ca-2001-26.html; rev:8;) proxy_filter alert tcp $EXTERNAL_NET $HTTP_PORTS -> $HOME_NET any (msg:"web-client readme.eml autoload attempt"; flow:to_client,established; content:"window.open(\"readme.eml\""; nocase; classtype:attempted-user; sid:1290; reference:url,www.cert.org/advisories/ca-2001-26.html; rev:8; proxy_filter;) 33

(web client attacks) proxy_filter Snort Snort (preprocessor) (Detection Engine) spp_http_decode. URL snort (plug-ins) spo_proxy_filter URL spo_proxy_filter 1 ProxyFilterSetup( ) snort plugbase.c InitOutputPlugins( ) snort (Rule Option) proxy_filter 2ProxyFilterInit( snort 3ProxyFilterOptionInit( 4ProxyFilter( URL 34

3. 3.4 35

TANet (Gigabit/Fast Ethernet) TANet 爲 URL 4.1 URL http://www.alsex4u.com service=no cache=no http://www.av-zone.net service=no cache=no http://www.dynamix.net service=no cache=no http://www.topzone.net service=no cache=no http://www.analjapan.com service=no cache=no http://www.xxx-eroticaworld.com service=no cache=no http://nextdoorxxx.com service=no cache=no http://www.sex.com service=no cache=no http://hardcore.nfspace.com/ service=no cache=no http://frank.ac service=no cache=no http://cutegirlies.dr.ag service=no cache=no http://realgayboys.dr.ag service=no cache=no http://thongsong.dr.ag service=no cache=no http://videololitas.dr.ag service=no cache=no http://amateurblondefuck.bl.am service=no cache=no http://linkzone.bl.am service=no cache=no http://3xxx.com.ar service=no cache=no 36

1 (IDS Server CPUIntel Pentium III 850 15G Bytes 100Mbps Linux Fedora core 1 Mysql 4.0.12 Apache 2.0.46 PHP 4.3.2 Adodb 3.30 Acid 0.96b23 JPGraph 1.12.1 LibPcap 0.7.2 Snort 2.0.6 (modified) 2 (Proxy Server CPUIntel Pentium IV 2.0G 40G Bytes 100Mbps Linux Fedora core 1 Mysql 4.0.12 Apache 2.0.46 Squid 2.5 stable 5 3 (Client) CPUIntel Pentium IV 1.6G Intel Pentium III 850 Windows XP 37

4.1 4.2 snort URL 4.2 snort URL URL URL 38

URL URL 4.3 snort URL 4.3 snort URL http://65.19.133.194/index.html http://66.230.170.82/index.php http://66.37.31.69/freepornpasses/index.htm http://208.185.230.221/coolios/cleanrabbitkaexit.shtml?bfree;6 http://208.185.230.221/coolios/rhexit.shtml?bfree;6 http://209.246.235.20/tgp/index.shtml http://209.246.235.20/readthis.html?teenxxxmag http://64.124.210.133/index.html http://209.246.235.128/links/fetish.html http://216.65.30.232/freepmb/bdsm053/index.html http://66.235.195.159/bondage/index.htm http://66.115.135.176/greenguy/bondage.htm http://209.246.235.128/submit_categories.html http://69.31.34.207/index.html http://66.55.170.100/e71ae5b9/exit/active/out4.html http://216.158.129.76/consoles/exitconsole.html?revid=2568 http://65.19.133.194/index.html URL URL ( 4.1) 50 39

6 2003 11 (Proxy log file [18] 50 20 8 1 7 50 4.4 4.4 URL filter 50 50 100% 26% 27 73% 27% 13 22 2 10% 90% 15 75% 25% 2 50 15 30% 70% 34 68% 32% 20 0 0% 100% 20 100% 0% 8 0 0% 100% 8 100% 0% 50 0 0 0% 0 0 0% 200 47% 17% 50 13 URL 26%URL rule base 40

( 4.4 ) Symantec AntiVirus 8.1 2004/4/26 rev.23 8 JavaScript VB Script script IE jav JavaScript Nimda java HTML JavaScript window.open readme.eml 4.5 S 4.5 JS.Exception.Exploit S S S S JS.Nimda S S S S VBS.zulu.A S S S S VBS.FreeLink.B S S S S JS.Trojan.WindowBomb S S S S VBS.happytime.A@mm S S S S VBS.LoveLetter.C(1) S S S S Nimda S S S S 41

( ) 4.5 42

(1) (2) (3) (4) (open source) (1) URL (2) (Misuse Detection) (Anomaly Detection) API Windows API (3) (e-mail) outlook 43

44

[1] Dai Kashiwa, Eric Y. Chen, Hitoshi Fuji, Shuichi Machida, Hiroshi Shigeno, Ken-ichi Okada, and Yutaka Matsushita, Active Countermeasure Platform against DDoS Attacks, IEICE TRANS. INF. & SYST., Vol. E85-D, No. 12, pp. 1918-1928, Dec. 2002. [2] A. Sundaram, An Introduction to Intrusion Detection, URL: http://www.acm.org/crossroads/xrds2-4/intrus.html [3] Emilie Lundin, and Erland Jonsson, Anomaly-Based Intrusion Detection: Privacy Concerns and Other Problems, Proceedings of the Computer Networks, Vol 34, No.5, pp. 624-640, Aug. 2000. [4] Robert F. Erbacher, Kenneth L. Walker, and Deborah A. Frincke, Intrusion and Misuse Detection in Large-Scale Systems, IEEE Transactions on systems, Vol 27, No.3, pp. 38-48, Feb. 2002. [5] Tripwire, URL: http://www.tripwire.org/ [6] Intrusion Detection System & Network Attack, URL: http://www.csie.nctu.edu.tw/~sjhuang/ids.php [7] M. Iguchi and S. Goto, Detection Malicious Activities through Port Profiling, IEICE Transactions on Information and Sytems, Vol.E82-D, No.4, pp. 784-792, Apr. 1999. [8] Susan C. Lee and David V. Heinbuch, Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks, IEEE Transaction on systems, man, and cybernetics part A: Systems And Humans, Vol. 31, No. 4, pp. 294-299, Jul. 2001. 45

[9] Robert K. Cuningham, Richard P. Lippmann, and Seth E. Webster, Detecting and Displaying Novel Computer Attacks with Macroscope, IEEE Transactions on Systems, Vol. 27, No. 4, pp. 275-281, Jul. 2001. [10] The Open Source Network Intrusion Detection System URL: http://www.snort.org/ [11] Marina Bykova, Shawn Ostermann, and Brett Tjaden, Detection Network Intrusion Via a Statistical Analysis of Network Packet Characteristics, IEEE Transactions on Network Security, Vol.1, pp. 309-314, Jun. 2001. [12] Jay Beale, James C. Foster, Jeffrey Posluns, and Brain Caswell, Snort 2.0 Intrusion Detection. US: Syngress Publishing Inc, 2003. [13] 2002 [14] The Open Source light-weight Network Intrusion Detection System URL: http://www.snortsam.net/ [15] 2001 [16] Ming-Zuo Chen, Intrusion Detection System Base on Hierarchical Rules, Master Thesis, Department of Information Engineering and Computer Science, Feng Chia University, 2002. [17] Ren-Jye Lin Intrusion Detection Using Dynamic Sorting, Master Thesis, Department of Information Engineering and Computer Science, Feng Chia University, 2003. [18], URL: http://tnrc.ncku.edu.tw/ 46