基于分布式蜜网的蠕虫传播与控制研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
近年来,随着互联网技术的飞速发展,网络提供了越来越多的应用和服务,其在给人们带来便利的同时,也给网络安全问题带来巨大的挑战,其受到的安全威胁日益增加,尤其是恶意代码的泛滥给网络及应用造成很大的破坏。在恶意代码中,蠕虫凭借无需人为干预、能够自动传播等特点,其造成的安全威胁最大。如何有效的防范并遏制蠕虫大范围传播成为很迫切的问题?在蠕虫相关研究中,对网络蠕虫结构、扫描策略、攻击方法的分析等是防范蠕虫传播的前提条件,蠕虫传播模型和控制策略的建立是防范蠕虫的根本保证和核心内容。
     虽然人们在如何有效检测和防范蠕虫传播等进行了一些研究,并开发了如防火墙、入侵检测系统(IDS)和反病毒软件等安全防护系统,但这些系统主要还是基于已有蠕虫进行针对性的防护,在对新型蠕虫的检测和防范方面显得力不从心。蜜罐和蜜网技术的出现,打破了传统的被动防御的局面,使得安全防御转为主动。同时,Internet无标度特性的发现对于深入研究网络蠕虫传播行为,基于网络拓扑结构特性进行针对性防护,树立网络化思维的安全观,对于保障网络安全具有重要作用。
     蜜罐技术是一种安全资源,其价值在于被扫描、攻击和攻陷。分布式蜜网是在蜜罐基础上逐步发展而来,并融入数据捕获、数据分析和数据控制等工具,按照分布式体系部署由诸多蜜罐及网络所构成的诱骗网络体系。本文正是以目前对分布式蜜网技术的研究为基础,针对网络蠕虫的特有传播机制、工作方式和当前网络蠕虫传播模型和控制策略的不足,将分布式蜜网技术与蠕虫检测及防御技术蠕虫融为一体,引入基于分布式蜜网的蠕虫捕获与控制系统。本文从构建蠕虫传播模型、提出相应的免疫及控制策略和从复杂网络抗毁性的角度构建分布式蜜网部署模型等方面进行研究。本文主要研究内容包括以下三个部分:
     第一,提出了基于分布式蜜网的蠕虫传播模型。鉴于已有蠕虫传播模型在描述现实网络蠕虫传播存在的不足,考虑到分布式蜜网下的蜜罐主机对蠕虫表现出强诱骗性,能优先感染蠕虫,其对出入的数据流采取“宽进严出”的控制策略等特性和Internet的无标度网络特性,考虑到及时安装补丁等使得主机对蠕虫具有免疫性和由于蠕虫变异、没有及时安装补丁等所导致免疫主机丧失免疫性而重新成为易感染节点等,构建部署分布式蜜网下的网络蠕虫传播模型,并通过模拟实验对其进行研究,并分析蜜罐诱骗级别和蜜罐数目等因素对蠕虫传播的影响。
     第二,提出基于分布式蜜网的蠕虫免疫及控制策略。基于当前免疫理论,考虑到分布式蜜网下的蜜罐充当“免疫代理”能对邻近的主机进行免疫,蜜罐间通过蜜网共享蠕虫信息,分布式蜜网体系下的蜜罐主机具备“宽进严出”数据控制策略,通过控制部署在网络边界及关键位置的蜜罐主机一定程度上对网络起到分割作用,遏制蠕虫大规模传播等,基于对免疫临界值等进行分析,给出了合理的免疫临界值,以最大程度上遏制蠕虫传播。
     第三,给出了分布式蜜网部署模型及实现方案。针对分布式蜜网能抑制蠕虫传播,对蠕虫进行免疫等,分布式蜜网部署对于保障网络安全具有十分重要的作用。本节主要考虑分布式蜜网的部署从微观上改变网络结构,研究其对网络抗毁性的影响等,构建分布式蜜网部署模型,通过对模型进行分析,得出一个合理的分布式蜜网部署及实现方案,并通过模拟实验对模型进行验证。
In recently years, with the rapid development of Internet, more and more applications and services are provided through the network, at the same time the security of the network also faces the enormous challenge, it is threatened seriously, especially the population of malicious code poses an essential part of these threat sources. Of all the malicious codes, worms are capable of self-propagation without human intervention, which means that more serious underlying disaster. Therefore, how to defend network against worms effectively and prevent it from spreading in the network become a pressing work. In the study of worm, the analysis to worm structure, scanning strategy and attack method etc al is the precondition to prevent worms form spreading in network, establishing worm propagation model and control strategy is essential guarantee and kernel content of defending against worms.
     A large of research have been done on how to detect and prevent network worms effectively and security systems such as firewall, intrusion detection system and anti-virus defending system had been developed, however, all these systems mainly defend network against worms purposely based on known worm sample, so that they can do nothing when a new style worm arises. The presence of honeypot and honeynet tries to change the passive situation of traditional network security by making the security preventing to active; meanwhile, the discovery of Internet performs obvious scale-free characters in topology is of great significance to research the worm behaviors in depth, protect network from attack on purpose based on network topology, build up network concept in security and ensure network security.
     Honeypot is a security resource whose value lies in being probed, attacked and compromised. Distributed honeynet is gradually developed based on honeypot, it add up to the tool of date capture, data analysis and data control, which is a honeynet network structure that was make up of by honeypot hosts and honeynet under distributed system. This paper took research on worm propagation and control strategy based on distributed honeynet which has been deployed in the network to defend against worms and hackers etc al. In view of the special propagation mechanism, working of worms and the limitation of present worm propagation model and control strategy in describe worm spread and control, we bring distributed honeynet and anti-worm technology into together and present worm capture and control system based on distributed honeynet. This paper try to construct worm propagation model under distributed honeynet, bring foreword to corresponding worm control strategy and construct the deployment model of distributed honeynet mentioned based on the invulnerability of complex network. This paper is composed of three parts:
     First, we present a worm propagation model based on distributed honeynet. In view of the limitation of the present worm propagation model in describing worm spread in the reality networks, considering honeypot host perform obvious inveiglement to worms, can be infected by worms at first time and its data control policy-"come in easily, out strictly" under distributed honeynet and the scale-free characters in network topology, we also considers the immunization of host for it install security update in time and the lose of immunity for immunized host for aberrance or other causes, it become susceptible again etc al, we construct worm propagation model under distributed honeynet, validate it over simulation experiment, analysis the effect of network topology, the degree of cajolery for honeypot host and the number of honeypot host in worm spread.
     Second, we present a worm immunization and control strategy based on distributed honeynet. Based on the present immunity theory, considers honeypot host can act as "immunization agent" to dispense immunity information to its neighbor hosts, honeypot hosts share worm information over honeynet and deploying honeypot at network boundary or key location can dividing network into many parts for its data control policy-"come in easily, out strictly" under distributed honeynet, then we can prevent worm form spreading in large-scale network over control honeypot host; at last ,we give a reasonable scheme with distributed honeynet over analysis, then prevent worm from spreading in the network.
     Third, we present the deployment model of distributed honeynet and its scheme to realization. Since distributed honeynet can be used in constraining worm propagation and worm immunization, the deployment of distributed honeynet is of great significance in ensuring network security. This section present a deploy model of distributed honeynet and the scheme to realization based on the analysis to distributed honeynet in network dividing and its influence on network invulnerability for the change of microcosmic structure, constructing a deployment model of distributed honeynet, and give its detail scheme to realization; at last, we validate the correctness of the model over simulation experiment.
引文
[1]国家计算机紧急与响应小组协调中心(CERT).CNCERT/CC 2007年网络安全工作报告[R/OL],2008[2008.4.09].http://www.cert.org.cn/articlees/docs/common/2008040823865.shtml.
    [2]Eugene H,Spafford.The Internet worm program:an analysis,ACM Computer Communication Review[J/OL],1989,19(1):15-57.http://www.cerias.purdue.edu/homes/spaf/tech-reps/823.ps.
    [3]CERT/CC,"CERT Incident Note INO-2001-09"[EB/OL],http://www.cert.org/incident_notes/IN-2001-09.html.
    [4]Andrew Mackie,Jensenne Roculan,Ryan Russell,et al."Nimda Worm Analysis"[R/OL].http://aris.securityfocus.com/alerts/nimda/010919-Analysis-Nimda.pdf.
    [5]戴汝为,操龙兵.Internet—一个开放的复杂巨系统[J].中国科学E辑2003,33(4):289-296.
    [6]李德毅.复杂网络与网络安全[J].军队指挥自动化,2005,6:15-22.
    [7]CERT.Code Red Ⅱ:Another worm exploiting buffer overflow in IIS indexing service DLL[R/OL].2001.http://www.cert.org/incident_notes/in-2001-09.html.
    [8]Weaver N.Potential strategies for high speed active worms[EB/OL].2002.http://www.cs.berkeley.edu/nweaver/worms.pdf.
    [9]S Staniford,V Paxson,N Weaver.How to Own the Internet in Your Spare Time[EB/OL],In Proceedings of the 11th USENIX Security Symposium,San Francisco,CA,Aug.2002.http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf.
    [10]Weaver N.Warhol worms:The potential for very fast Internet plagues[EB/OL].2002.http://www.cs.berkeley.edu/nweaver/warhol.html.
    [11]Kephart JO,Chess DM,White SR.Computers and epidemiology[J].IEEE Spectrum,1993,30(5):20-26.
    [12]Kephart JO,White SR.Measuring and modeling computer virus prevalence[C].In:Proc.of the IEEE Symp.on Security and Privacy.Oakland,1993.2-15.
    [13]Zou CC,Gong W,Towsley D.Code Red worm propagation modeling and analysis[J].In:Proc.of the 9th ACM Symp on Computer and Communication Security.Washington,2002.138-147.
    [14]Steve W.Open problems in computer virus research[R/OL].1998.http://www.research.ibm.com/antivirus/SciPapers/White/Problems/Problems.html.
    [15]Arnold B,Chess D,Morar J,et al.An environment for controlled worm replication and analysis[R].Virus Bulletin,Oxfordshire,2000:1-20.
    [16]Yang S.Relations M.NSF awards $5.46 million to UC Berkeley and USC to build test bed for cyber war games[EB/OL].2003.http://www.berkeley.edu/news/media/releases/2003/10/15testbed.shtml.
    [17]Jolm F Shoe H,and Jon A HuPP.The Worm Programs Early Experience with Distributed Computation Communications of AEM[J]1982,25(3),172-180.
    [18]Kienzle DM,Elder MC.Recent worms:A survey and trends[R].In:Staniford S,ed.Proc.of the ACM CCS Workshop on Rapid Malcode,2003.
    [19]郑辉.Internet蠕虫研究[D].天津:南开大学信息技术科学学院,2003.
    [20]文伟平,卿斯汉,蒋建春,王业.网络蠕虫研究与进展[J].软件学报,2004,15(08):1208-1219.
    [21]Streftaris G,Gibon GJ.Statistical inference for stochastic epidemic models[R].In:Proc.Of the 17th Int'1 workshop on Statistical Modeling.Chania,2002:609-616.
    [22]Frauenthal JC.Mathematical Modeling in Epidemiology[M].New York:Springer-Verlag,1980
    [23]Chen Z,Gao L,Kwiat K.Modeling the spread of active worms.In:Proc.of the IEEE INFOCOM,2003[C],2003.
    [24]L.Spitzner.The Honeynet Project:Trapping the Hackers[J],IEEE Security and Privacy 2003,1(1):15-23.
    [25]L.Spitzner.Honeypot-Definitions and Value of Honeypots[EB/OL].(2003,05,29).http://www.tracking-hackers.com/papers/honeypots.html.
    [26]Honeynet Project.Know Your Enemy Gen Ⅱ Honeynets[EB/OL].(2003,11,03).http://project.honeynet.org/papers/gen2/index.html.
    [27]Erd(o|¨)s P,Renyi A.On the evolution of random graphs[J].Publications of the Mathematical Institute of the.Hungarian Academy of Sciences,1960,5:17-61.
    [28]Watts D J,Strogatz S H.Collective dynamics of 'small-world' networks[J].Nature,1998,393:440-442.
    [39]Barabasi A-L,Albert R.Emergence of scaling in random networks[J].Science,1999,286:509-512.
    [30]汪小帆,李翔,陈关荣等.复杂网络理论与应用[M].北京:清华大学出版社,2006.10.
    [31]Waxman BM.Routing of multipoint connections[J].IEEE Journal on Selected Areas in Communications,1988,6(9):1617-1622.
    [32]Faloutsos M,Faloutsos P,Faloutsos C.On power-law relationships of the Internet topology[J].ACM SIGCOMM Computer Communication Review,1999,29(4):251-262.
    [33]Newman M E J.The structure and function of complex networks[J].SIAM Review,2003,45(2):167-256.
    [34]Albert R,Jeong H,and Barabasi A L.Attack and error tolerance in complex networks[J],Nature,2000,406:387-482.
    [35]Barabasi A L,Bonabeau E.Scale-free networks[J].Scientific American,2003,5:50-59.
    [36]Paster-Satorras R,Vespignani A.Immunization of complex networks[J].Phys.Rev.E,2002,65:036104.
    [37]Anderson R M,May R M.Infections diseases in humans[M].Oxford:Oxford Univ Press,1992.
    [38]Cohen R,Havlin S,Ben-Avraham D.Efficient immunization strategies for computer networks and populations[J].Phys.Rev.Lett,2003,91:247901.
    [39]Madar N,Kalisky T,Cohen R,et al.Immunization and epidemic dynamic in complex networks[J].Eur.Phy.5.J.B,2004,38:269-276.
    [40]Dezso Z,Barabasi A L.Halting viruses in scale-free networks[J].Phys.Rev.E,2002,65:055103.
    [41]D.Morre,C.Shannon,G.M.Voelker,et al.Internet Quarantine:requirements for containing self-propagation code.INFOCOM 2003.Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies.2003[C],3:1901-1910.
    [42]Jacob G,Yuval S,Eran S,Sorin S.Distributive immunization of networks against viruses using the 'honeypot' architecture.Nature Physics[J].2005,11:184-188.
    [43]王平,方滨兴,云晓春.基于分割的蠕虫传播抑制方法[J].北京邮电大学学报,2006,29(5):24-27.
    [44]Broder A,Kumar R,Maghoul F,et al.Graph structure in the Web[J].Computer Networks,2000,33(1):309-320.
    [45]Holme P,Kim B J,Yoon C N,et al.Attack vulnerability of complex networks[J].PhysRev.E,2002,65(5):056109.
    [46]Cohen R,Erez K,ben-Avraham D,Havlin S.Resilience of the internet to random breakdowns.Phys.Rev.Lett.,2000,85(21):4626-4628.
    [47]Newman M E J,Strogatz S H,Watts D J.Random graphs with arbitrary degree distributions and their applications[J].Phys.Rev.E,2001,64(2):26118.
    [48]Shargel B,Sayama H,Epstein IR,et al.Optimization of robustness and connectivity in complex networks[J].Phys.Rev.Lett,2003,90(6):068701.
    [49]Paul G,Tanizaw a T,Havlin S,et al.Optimization of robustness of complex networks [J].Eur.Phys.J.B,2004,38(2):187-191.
    [50]Valente A X C N,Sarkar A,Stone H A.Two-peak and three-peak optimal complex network [J].Phys.Rev.Lett.2004,92(11):118702.
    [51]Wang B,Tang H W,Guo C H,et al.Entropy Optimization of Scale-free Networks Robustness to Random Failures[J].Physical A,2005,363:591-596.
    [52]谭跃进,吴俊,邓宏钟等.复杂网络抗毁性研究综述[J].系统工程,2006,10(24).

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700