¨¾¤î§ðÀ»¸õªO¥D¾÷ªº¦w¥þºÞ²zµ¦²¤

 

¶À¥@©ø

¤¤¥¡¬ã¨s°| ¸ê°T¬ì¾Ç¬ã¨s©Ò §U¬ã¨s­û

skhuang@iis.sinica.edu.tw

 

ºK­n

§ðÀ»¸õªO¥D¾÷ªº°ÝÃD¹ï¥Ø«eºô¸ôµ²ºc¤wºc¦¨ÄY­«¦w¥þ«Â¯Ù¡A¼ç¥ñªº¦M¾÷±N¶W¹L¤@¯ë¹q¸£¯f¬r¡C¾Úĵ¬F¸p¦D¨Æ§½ªº²Î­p¦ô­p¡A°ê¤º¬ù¦³¤Q¤À¤§¤@ºô¸ô¥D¾÷³Q´Þ¤J¤ì°¨µ{¦¡¡]§Y§ðÀ»¸õªO©Ò§Q¥Îªº«áªù±J¥D¡^¡C³Ìªñºô¯¸¤J«I¨Æ¥óÀW¶Ç¡A¦h¼Æ»P³Q¾ÞÁaªº¥D¾÷¦³Ãö¡A¦p Yahoo¡BeBay µ¥°Ó¥Îºô¯¸¾D¨ü¤À´²¦¡ªýÂ_§ðÀ»¡]¤j¶q¥D¾÷³Q¦w©ñªýÂ_§ðÀ»µ{¦¡¡^¡ALove-You-Letter »P³Ìªñªº Navidad ¨Æ¥óµ¥«h¬O­Ó¤H¹q¸£³Q¥Î¨Ó¶¡±µ´²§G§ðÀ»µ{¦¡¡C¥»¤å±´°Q¦UºØ¸õªO§ðÀ»¤èªk¡A¨¾¤îµ¦²¤¡B¨Ã±´°Q°l¬d§Þ³Nªº¥¼¨Óµo®i¡B¬ÛÃöªk«ß³d¥ôÂkÄݵ¥¡C

 

ÃöÁä¦r: ¸õªO§ðÀ»¡B«áªù¾Þ±±¡BÁô±K³q¹D¡B»¤³´°õ¦æÀô¹Ò¡B¦æ¬°«ü¯¾¡C

 

¤@¡B§ðÀ»¸õªO»Pºô¸ô¦w¥þ«Â¯Ù

³Ìªñ·L³n¤½¥qµ{¦¡½X¾DÅÑ¡A¦h³B°Ó°Èºô¯¸­±Á{¤À´²ªýÂ_§ðÀ»¡A¬ü°ê¦U¤j¾Ç¯É¾D¤j³W¼Ò¥þ­±¤J«I¡C³o¨Ç³£¤ÏÀ³¸ê°T¦w¥þ«Â¯Ù¤wÄY­«¼vÅT¤j²³ªº¤é±`¥æ©ö©¹¨Ó¡C®Ú¾Ú TW-CERT 88 ¦~ªº°ê¤ºWeb server ¦~«×¦w¥þ½Õ¬d[4]¡A¦³ 53 % ªº¥D¾÷¥i³Q¨ú±o Web Admin ªºÅv­­¡C§Ú­Ìªñ¤éªº¦Û§Ú¦w¥þÀË´ú¾÷¨îªº°O¿ý¦³Åã¥Ü¦³°ª¹F 59% ¾÷¾¹¦³µ{«×¤£µ¥ªº¦w¥þ¯Ê³´¡C¦]¦¹¦D¨Æ§½ªº¡u¤ì°¨¡v¥D¾÷¦ô­p¤ñ²v(1/10)¨Ã¤£ºâ°ª¦ô¡A¦]¬°¥u­n¦³¤ßªº¤J«IªÌ³£¥i¯à¦b53% ªº¥D¾÷¤¤´Þ¤J¡u«áªù¡v¡C

 

¦ý¤@¯ë¤H¹ï©ó¦w¥þĵı³£«]­­©ó¡u¥iµø¡v©Î¡u¥i¹îı¡vªº¦w¥þ«Â¯Ù¡A¨Ò¦pºô­¶¾D­P«§ï¡A©Î¸ê®Æ³Q·´·l¡C¥h¦~¤K¤ë¬F©²ºô¯¸³Q¤jÁ|¶î´«ºô­¶¡A¦U¬É¯ÉªíÃö¤Á¡A¤½Å¥¡B®y½Í·|¤£Â_Á|¦æ¡A¦ý¨Æ¶È©ó¦¹¡C¤µ¦~¤Q¤ë°ê¼yºô¸ôÁÁ¶Ç±N¦³Ãþ¦ü¨Æ¥ó­«ºt¡A¨Æ«á¶È¦³¹s¬Pºô¯¸¦³ºô­¶³Q§ï¸ñ¶H¡A¦]¦¹¤j®a¼y©¯¤£¤w¡A§ó²`«H¦¹¬°¡uÁÁ¶Ç¡v¡C¦ý±¡ªp¯u±o¦p¦¹¼ÖÆ[¶Ü¡H®Ú¾Ú§Ú­Ì²`¤J½Õ¬d¡A¦b³æ¤@¾÷Ãö¤º¦³¦s¦b¦UºØ¤£¦P§Î¦¡«áªùªº¥D¾÷¡A¤ñ¨Ò¹F 50%¡C³o¼Ëªº¤ñ¨Ò­è¦n¤ÏÀ³ TW-CERT ¦~«×¦w¥þ½Õ¬d¼Æ¾Úªº¥i«H«×¡G¥ç§Y³o¨Ç¥i¯à³Q¨ú±o admin shell ªº¥D¾÷¡A³£¦³¬YºØ§Î¦¡ªº«áªùµ{¦¡ÁôÂè䤤¡C

 

1.      ¥¼¨Ó§ðÀ»ÁͶÕ

¥¼¨Óºô¸ô¦w¥þ«Â¯Ù³£±N»P«áªù«Ø¥ß®§®§¬ÛÃö¡A¥]¬A¡G

n       §ðÀ»«á·tÂÃÁô±K¾Þ±±«áªù

³o¬Oºô¸ô§ðÀ»ºë½o¤Æªº¥²µMµo®i¡C¥ç§Y½ÆÂøªº§ðÀ»¹Lµ{±N¤À¶¥¬q¡A©ÎºÙ¬°§ðÀ»ª¬ºA§Ö¨ú (Attack Process Cache)¡A¦b¤J«I¥Øªº¹F¦¨¤§«e¡A¥Î¨Óºûô«e¦¸§ðÀ»³~®|ªººZ³q¡C

n       «áªù»P¯f¬r·P¬V´C¤¶¾ã¦X

«áªùµ{¦¡±N»P¯f¬r·P¬V¤è¦¡¤¬¬Û¾ã¦X¡C¶Ç²Î¯f¬r¬O¦P¨B«D¾Þ±±¼Ò¦¡¡A¥ç§Y¥u¯à¨Ì¿à¨Æ¥ó¦P¨B¡]¦p13¤é¬P´Á¤­¡^¡A¥H¤Þµo´c·N«ü¥O¡C¦ý«áªùµ{¦¡ªº¯S©Ê¬O«D¦P¨B¾Þ±±¼Ò¦¡¡AÀH®É¥i¯àIJµo´c·N«ü¥O¡C

n       ¤À´²¦¡¡B¤j³W¼Ò¶¡±µ§ðÀ»

³Ì¨å«¬ªº¹ê¨Ò¬O¤À´²¦¡ªýÂ_§ðÀ»(Distributed Denial of Service)¡A§Q¥Î¤j¶q¤À´²©ó¦U¦aºô¸ôªº¥Î¤á¥D¾÷¡A¦P®É±Ò°Ê§ðÀ»¡C«áªùµ{¦¡ªº¹B¥Î¬O¤À´²¦¡§ðÀ»­«­nªº¤@Àô¡C

 

2. «Ø¥ß«áªù¤§¥Øªº

n           ÅѨú¸ê·½§Q¥Î¡A¨Ò¦pºô¸ôÀW¼e¡]³]¸m http proxy server¡^

´²§G¦U¦a¹q¸£ªº«áªù¡A¬°¼Æ¬Æ¦h¬O¥Î¨ÓÅѨú¸ê·½¡A¥]¬A Web access »P E-mail Relay¡A¥H¨ú±oÄ_¶Qªººô¸ô¸ê·½¡CÁ|¤¤¬ã°|¬°¨Ò¡A¹ï¥~ÀW¼e¥R¨¬¡A¬O¦³¥ø¹Ï¥Î¤á«I¤Jªº³Ì¤j»¤¦]¡C¦U¤j ISP ¦P¼Ë­±Á{Ãþ¦ü«Â¯Ù¡C¨Æ¹ê¤W¡A³o¼Ëªº¥Ç¸o§ÎºA¦p¦Pµs¥´¹q¸Ü¡A¥iÂÇ¥H¸`¬Ùºô¸ô¨Ï¥Î¶O¥Î¡C

n           «D¦P¨B§ðÀ»ª¬ºA§Ö¨ú

ºûÅ@ª¬ºA§Ö¨ú(cache)±N¥i§Ö³t¨ú±o¤W¦¸§ðÀ»ª¬ºA¡A¥iÀ³¥I½ÆÂøªº¤J«I­pµe¡A¨Ò¦p§ðÀ»¥i¨Ì¾Ú¥Ø¼ÐÅv­­®t²§¡A¥ý¨ú±o§CÅv­­¥Î¤á¹q¸£¦s¨úÅv¡A¦Aº¥¶i´x±±°ªÅv­­¥Î¤á¡A¶i¦Ó¤J«I­«­n¦øªA¾¹¡C¶¶§Ç¤W¡A¬°§CÅv­­¸ê°T¥Î¤á¢w> °ªÅv­­¸ê°T¥Î¤á ¢w> ´¶³q¦øªA¾¹±b¸¹ ¢w> ºÞ²zªÌÅv­­±b¸¹¡C¨C¤@¶¥¬qªº§ðÀ»ª¬ºA§Ö¨ú¥iºûô¤J«IºÞ¹DªººZ³q¡C

n           ³]¥ß§ðÀ»¸õªO

¶¡±µ§ðÀ»¥iÁ×§K³Q°l¬d¡A¦P®É¾Þ±±¤j¶q§ðÀ»¸õªO¡A¥H¤£¦P¨Ó·½¦ì§}¹F¨ì´ÛÄF¬y¶qºÞ²z¨t²Î¥Øªº¡A¶i¦Ó§Î¦¨¤À´²ªýÂ_§ðÀ»¡C

 

3. «áªùµ{¦¡«I¤J¤è¦¡

  ¤@¯ë§ðÀ»«á´Þ¤J

«áªù´Þ¤Jªº³Ì¨Î±J¥D¬O¹ï©ó¡u¦w¥þ¡v¤£¸g¤ßªº¨Ï¥ÎªÌ¡C²Ä¤@Ãþ¬OºÞ²z¤£µ½ªº¦øªA¾¹¡C²Ä¤GÃþ¬O¸ê°T½Ã¥Í²ßºD¤£¨}ªº¥Î¤áºÝ¹q¸£¡C¥¼¨Ó­±Á{ªº³Ì¤j«áªù«Â¯Ù±N¨Ó¦Û¥Î¤á¨t²Î¡C¹ï©ó¥Î¤á¨t²Î³Ì¤j«Â¯Ù¥]¬A¡G

n          E-mail: ¯f¬r¡B´c·N°õ¦æÀɧ¨±a¨Ã¤£¥i©È¡C²{¦b³Ì¨ã«Â¯Ùªº¬O¨Ï E-mail ±µ¦¬³nÅé²£¥Í°O¾ÐÅé·¸¼g§ðÀ»ªº´c·N±±¨îÀÉÀY(header)¡A³oÃþ§ðÀ»ªº¯S©Ê¬O¥u­n¥Î¤á±µ¦¬ E-mail¡A¤£¥²¶}±Ò´N·|·P¬V¡C³o¬O¥i¥H¬ð¬ï¥ô¦óÄY±K¨¾¤õÀ𪺧ðÀ»¡C

n          Web Content: malicious Script/Applet ¡C

n          Document Contents: ²z½×¤W©Ò¦³®æ¦¡ªºÀɮ׳£¼çÂæM¾÷¡A¥i¨ÏÀ³¥Îµ{¦¡²£¥Í¯Ê³´¡A¶i¦Ó°õ¦æ«Dªk«ü¥O¡C³oºØ§ðÀ»¥i¥H¬ð¯}¹êÅéºô¸ô¹jµ´¡C

 

  ¤H¦]¯Ê³´(social engineering)

n          ¹ê»Ú¬° Script ©Î¥i°õ¦æÀɮסA¦ýÁôÂì° .txt .jpg .gif ÀɦW¡C

n          ¥H¼ôÃѪB¤Í¨­¥÷¡AE-mail §¨±a´c·N¥i°õ¦æ¤º²[¡C

 

4. °»´ú«áªùµ{¦¡ªº§xÃø©Ê

¤@¥¹¾D¨ü§ðÀ»¡A¬°½T«O¨t²Î¤£³Q¸m¤J«áªùµ{¦¡¡A­Y¨Æ¥ý¨S¦³°O¿ý¦UÀɮתº½]®Ö½X (checksum)¡A©Ò¦³¥i°õ¦æÀÉ¡B¨t²Î³]©w³£­n­«·s¦w¸Ë¡A¦]«áªùµ{¦¡²z½×¤W¥i¤Æ¨­¬°²{¦sªºÀ³¥Îµ{¦¡¡A¬Æ¦Ü²`¤J¨t²Î®Ö¤ß¡A¥i¼ÒÀÀ­ì§@·~¤è¦¡¡A¨Ï¨t²Î¹B§@¦p±`¡A«ÜÃøµoı¨ä¦s¦b¡C¤@¯ë°»´ú³nÅé¶È¯à°»´ú¡u³Q°Ê³s½u¡v¤è¦¡ªº«áªù¡A°»´ú²v»P»~¥¢²v³£«ÜÃø¦X¥G»Ý¨D¡A¦]³Q°Ê³s½uªº port ¦ì§}¥i¥ô·N§ó°Ê¡A³s½u¨ó©w§óÀHµÛ¹B¥ÎªÌ¤£¦P¡A¥i»´©ö§ó§ï¡C¥¼¨Ó«áªùµ{¦¡ªºÅܲ§µ{«×»Pµo®i³t«×±N»·°ª©ó¤@¯ë³æ¯Â¹q¸£¯f¬r¡C

 

5. µo²{«áªùªº¨Æ¨Ò

§Ú­Ì¤w²³æ»¡©ú§ðÀ»ÁͶջP«áªù«Ø¥ßªºÃö«Y¡B¥Øªº¡B»P´Þ¤J¤è¦¡¡C¦¹½×¤åªº°Ê¾÷·½¦Û³Ìªñ¦b³]©w firewall ®É¡A¦]°l¬d²§±`¬y¶q·½¤~Ååı«áªùµ{¦¡¥ÆÀݪºÄY­«©Ê¡C¦b firewall ¸Ì­±¦³¤@¥x«Ü³æ¯Âªº¦øªA¾¹¡A¥u´£¨Ñ«H¥óÂà°e»P°ì¦W¬d¸ß¤Î©e¥ô¡A¦]¦¹°£¤º¹ï¥~ udp port 53 ¡A¥~¹ï¤º udp port 53¡B tcp port 25 ¶}©ñ¡A¨ä¥L port ¤£¸Ó¦³¬y¶q¡C¦ý´N¦b·sªº¦w¥þ¬Fµ¦¬I¦æªºÀþ¶¡¡A¤j¶q«Ê¥]³Q©Úµ´¶Ç°e¡C§Ú­Ì¦]¦¹ÃhºÃ«áªùµ{¦¡¤w«I¤J¡C¨Ï¥Î lsof (list opened file) ¤ñ¹ï¦Uµ{§Ç»P©Ò»ÝªA°È¦ì§}¡A¤~§ä¥XÁô¨­¬°¥¿±`ªº¦øªAÀ³¥Î¨t²Î¡C³o¬O¤@¤ä³Q°Ê³s½u«¬ªº»·ºÝ¾Þ±± root shell¡C

¤G¡B«áªù¦w¸Ë«¬ºA»P¸õªO¤è¦¡

  1. «O¯d²{¦³©Î¦w¸Ë¦³¦w¥þ¯Ê³´ªA°È³nÅé¡B³]©w(Vulnerable Service¡BConfiguration)

³Ì¨Îªº«áªù¬O«O¯d¦³¦w¥þ¯Ê³´ªºªA°È³nÅé¡A¦ýÅý¨Ï¥ÎªÌ»~¥H¬°©Ò¥Îªº¬O³Ì·s¨S¦³¯Ê³´ªºª©¥»¡C¦]¦¹²z½×¤W¦³¦w¥þ¯Ê³´ªºªA°È³nÅé¡A­Y¥i¾Ú¥H¨ú±o¨t²Î¦s¨úÅv­­¡A³£¥iµø¬°¡u«áªù¡v¡C

n          ´ÛÄF¸É±jµ{¦¡¡G¤J«IªÌ­P¤O©ó­×§ï¦w¸Ë³]©wÀÉ¡A§ó·s¸É±jª©¥»¸ê°TÅã¥Ü°T®§¡A¦ý¨ã¯Ê³´³nÅéºû«ù¤£ÅÜ¡C

n          ´ÛÄF¦w¥þÀË´úµ{¦¡¡G½s¿è°õ¦æÀÉ¡A§ó§ïª©¥»Åã¥Ü¸ê°T¡C¥]¸ËªA°È³nÅé (wrapper)¡A¹LÂoÄdºI¨ó©w¿é¥X¤J¤¤§t¦³¯S©wÀË´ú¦r¦ê¸ê®Æ¡]¦p±`¥Î¦w¥þ®zÂI±½ºË¨t²Î¡B¤ñ¹ï¹ï©ó¬YºØ CVE[3] ªºÀË´ú¤è¦¡¡^¡A¥OÀË´úµ{¦¡»~§P¡C

 

2.      ¸m´«²{¦³ªA°È³nÅé¡Aºû«ù¨ä­ì¦³¨ó©w¹B§@¥¿±`

³Ì¦³¦Wªº«áªù¬O Ken Thompson ¦b¨ä¦­´Áµo®iªº  Unix login µ{¦¡¤¤ÁôÂáu·tªù¡v¡A·í¿é¤J¯S©w¦WºÙ®É¡A¥i¨ú±o¶WÅv­­±ÂÅv¡C¦]¦¹§ó§ï login µ{¦¡¬O©ñ«áªù³Ì§Öªº³~®|¡A±N¨Ï©Ò¦³¤¬°Ê¦¡»·ºÝ³s½uµ{¦¡¦p telnet/rlogin µ¥ºû«ù­ì¦³¹B§@¥¿±`¡A¦ý¦b¯S©w¿é¤J®É±N¶}±Ò«D¥¿·í±ÂÅvªºÅv­­¡C

 

3.   «D¬J¦³ªA°È¡A¥t¦w¸Ë¾Þ±±ªA°È

³o¬O¥Ø«e³Ì¬y¦æªº«áªù¾Þ±±¤è¦¡¡AµS¦p»·ºÝ¾Þ±±­Ó¤H¹q¸£¡A¦ý¤]³Ì®e©ö³Q°»´ú¥X¨Ó¡C¤@¯ë¯f¬r°»´úµ{¦¡³£¯à§ä¥X³oÃþªº«áªù¡C

 

¤T¡B«Ø¥ßÁô±K¾Þ±±³q¹D

­n«Ø¥ßÁô±K¾Þ±±³q¹D¡A¥i¤À§O«Ø¥ß¡]1¡^¾Þ±±«ü¥O³q¹D(Command Tunnel, C Tunnel)¡A¡]2¡^¦^À³°T®§³q¹D(Response Tunnel, R Tunnel)¡C¤GªÌ¥i¬Û¨Ì©Î¿W¥ß¡C³o¨âºØ³q¹D¤S¤À§O¥i¥Ñ¾Þ±±ªÌ¥D°Ê(Active Controller)/³Q°Ê(Passive Controller)¡A»P¨ü±±ªÌ¥D°Ê(Active Responder)/³Q°Ê(Passive Responder)¡C¥H (C Tunnel, R Tunnel) ªí¥Ü¡AType I: (Active Controller, Active Responder), Type II:(Passive Controller, Active Responder), Type III:(Active Controller, Passive Responder), Type IV:(Passive Controller, Passive Responder)¡C

 

1.      Type I Tunnel

³o¬O¤@¯ë«Ø¥ß³Q°Ê³s½u (Passive Tunnel, forward shell)ªº¤è¦¡¡C¦b¨ü±±¤è¡]³Q±H±JºÝ¡^°õ¦æ«áªù«ü¥O±µ¦¬ªA°Èµ{¦¡¡]©ó¯S©wªA°È¦ì§}¡^¡A³o¬O³Ì¼sªx¦s¦bªº¾ÞÁa¤è¦¡¡A§Î¦¨·tÂ꺦øªA¨t²Î¡C³o¬O¤@¯ë¤¬°Ê¦¡ªº²×ºÝªA°Èµ{¦¡¦p telnetd/rlogind µ¥§Î¦¡ªº«áªù¡Cºô¸ô¨¾¤õÀð§Y¥iªý¾×³oÃþªº¾Þ±±³q¹D¡C¡]¨¾¥~©¹¤º¬y¶q¡^

2. Type II Tunnel

³o¬O¨ü±±ªÌ¥D°Ê¶Ç»¼¸ê®Æ (Active Tunnel, reverse shell)ªº¾Þ±±¤è¦¡¡A¤@¯ë³£¬O¥H http/ftp µ¥¦Xªk¹ï¥~¨ó©w¡A«Ø¥ß tunnel (¦p©Ò¦³¹ï¥~³s½u³£¸g¥Ñ http)¡A§Î¦P«Ø¥ß¥H http «Ê¥]Äâ±a¼h¡Aºc«ØµêÀÀ±MÄݺô¸ô¡C

n          Reverse Shell

n          Valid Protocol Tunnel for VPN

n          ¨¾¤õÀ𥲶·¨¾Å@¤º©¹¥~¬y¶q¡C

 

3.      Type III Tunnel

¾Þ±±ªÌ¹ï¤º³¡ºô¸ô°e«ü¥O«Ê¥]¡A¨Ã¥H¶¡±µ¤èªk±µ¦¬¦^À³°T®§¡C

 

4.      Type IV Tunnel

¾Þ±±ªÌ±N«ü¥O¸m©ó¥~³¡¤½²³ºô¸ô¡A¨Ò¦p¸g´x±±¤§¤J¤fºô¯¸ªººô­¶¡C¨ü¾Þ±±ªÌ¦A±N¦^À³¸m©ó¥~³¡´£¨Ñ¤W¸üÀÉ®× ftp ¦øªA¾¹¡C

 

5.      ¯S®íªº Command Tunnel »P Response Tunnel

5.

Command Tunnel

1.      ¤º°e E-mail ¤º²[·tÂëü¥O (with Terminal Invisible Text string)

2.      ¤º°e¯S®í¨ó©w·tÂëü¥O¡A¨Ò¦p ICMP unused option (echo request, echo reply, port unreachable, host unreachable µ¥)

3.      ¥~³¡¤J¤fºô¯¸ Web Page ·tÂëü¥O

4.      ¤º³¡ºô¸ô¬y¶q·tÂëü¥O

 

Response Tunne

1.      ¼v¹³·tÂæ^À³¸ê®Æ (Information Hiding)

2.      ¥~°e E-mail ¤º²[·tÂëü¥O

 

¤W­z«ü¥O©Î¦^À³³q¹D³£¥i¸g¥[±K³B²z¡C

¥|¡B¨¾¿mµ¦²¤

n          ¤@¯ë©Ê«OÅ@¡]general protection¡^

1.      vulnerable host ¸T¤î¥~¹ï¤º/¤º¹ï¥~³s½u¡C»P¦w¥þÀË´úµ{¦¡°t¦X (Vulnerability Scanner/Auditor)¡A­Y¤@ÀË´ú¦³¦w¥þ¯Ê³´¡A°¨¤W»P firewall policy service ³s½u¡A©Úµ´©Ò¦³¤º¥~³s½u¡C

2.      «áªùµ{¦¡°»´ú (backdoor detection)

Active Detection

n          ¥Î¥H°»´ú passive tunnel ªº¦s¦b

Passive Detection

n          ¥Î¥H°»´ú  active tunnel (reverse shell) ªº¦s¦b¡C

n          °»´ú well known protocol port number¡A°O¿ý«D¦Xªk¨ó©w«Ê¥]¡B¨Ó·½¤Î¥Øªº¦ì§}¡C

n          °»´ú«D Interactive protocol port number¡A°O¿ý«D Interactive ¦æ¬°«Ê¥]¡C[16,17]

 

n          ¥Î¤áºÝ«OÅ@±¹¬I¡]Client Protection¡^

1.      Sendmail SMTP authentication

¦¹±¹¬I¥i¹w¨¾Ãþ¦ü Melissa ¡BLove-letter¡BNavidad µ¥«H¥ó³sÂê­·¼Éªº«áªù§ðÀ»¡C¦ý¥²¶·Äµ§i¨Ï¥ÎªÌ¤£­n°O¾Ð»{ÃÒ±K½X¡C

2.      Delay sent of Outgoing E-mail

 

3.      Security Policy Enforcement

n          ¥~¹ï¤º¡G©Úµ´©Ò¦³³s½u (Not established)

n          ¤º¹ï¥~¡G¥u¶}©ñ¤¹³\¨Ï¥ÎªA°Èªº port ¦ì§}¡A¨Ã¥H application proxy ¤è¦¡¡AÀˬd³s½u«Ê¥]¡A©Úµ´«D¥¿½T¨ó©w«Ê¥]ªº¶Ç»¼¡C¦ý¬°¤F©Úµ´¥H¯S©w¨ó©w§@¬°µêÀÀ±M½u©³¼h¨ó©wªº tunnel ³s½u¡A¥²¶·¥H²§±`¤ÀªR¾÷¨îºÊ±±¡C³o¤è­±ªººÊ±±¤èªk©|«Ý¸Ñ¨M¡C¦]¬° tunnel «Ê¥]¥H¦Xªkªº¨ó©w¹ï¥~¡A·¾³qªº«Ê¥]¶q»PÀW²v¤]¯à±±¨î¦b¦X²z½d³ò¡]¥u¬O­°§C¾Þ±±ªÌªº¦^À³³t²v¡^¡A¦]¦¹¤£©ö°»´ú¡C

 

n          ¦øªAºÝ«OÅ@±¹¬I ¡]Server Protection¡^

1.      all open files are monitored

2.      «Ø¥ß¦øªA¾¹ÀÉ®×½]®ÖÀˬd°O¿ý (¦p tripwire)

3.      Security Policy Enforcement:

n          ¥~¹ï¤º¡G¥u¶}©ñ¦øªA¾¹ªA°È port ¦ì§}¡]¦p E-mail smtp tcp port 25¡^¡A¥B¥H application proxy ¤è¦¡±µ¨ü³s½u¡A©Úµ´«D¥¿½T¨ó©w«Ê¥]¡]¦p udp port 53 ¥u¤¹³\ DNS packet¡A¥á±ó¨Ã°O¿ý¨ä¥L©Ò¦³«D DNS ¡B¤£¦Xªk«Ê¥]¡A±Ä¨ú³o¼Ëªº±¹¬I±N¥iÁ×§K¥D°Ê°T®§«áªù¸g¥Ñ port 53 ¶Ç»¼¤Ï¦V shell «Ê¥]¡C¡^

n          ¤º¹ï¥~¡G©Úµ´©Ò¦³³s½u (Not established)¡C

n

 

¤­¡B°l¬d§Þ³Nªºµo®i

1. »¤³´¸Ë¸m¨t²Î

»¤³´ªº¥Øªº¬O°l¬d¤J«I¨Ó·½¡C¥Ø«eºô¸ô¥Ç¸o¯}®×²v¬Û·í§C¡A»¤³´»P°lÂܪº¬ÛÃö©Ê»P­«­n©Ê©úÅã¥i¨£¡A¤@¯ë«ØÄ³ªº¤èªk¬O«Ø¥ß¦U­«­nºô¸ô¥X¤fºÊµø¨t²Î¡A¨Ã°t¦XºôºÞ¨t²Î¡A«Ø¥ß§Y®É caller ID °lÂÜ¡C

 

³o¤è­±ªº¦¨ªG¥D­n¬O NAI[5]ªº CyberCop Sting Server¡A¨ã¦³¼Ò¥é Windows NT¡BSolaris¡B¥H¤Î Cisco Routerµ¥§@·~Àô¹Ò¡C[7,10]¬O¦p¦ó«Ø¸m Honey Pots Àô¹Ò¡A[6] «h¬O§ó°Ê Inetd ©Î©Ò¦³·|¬ªº|¨t²Î¸ê°Tªº¦a¤è¡AÅã¥Ü¥O¤J«IªÌ²V²cªº¸ê°T¡A¨Ò¦p­ì¬O Linux ¡A«h´«¸Ë¬° FreeBSD ©Î Solaris¡C[8] ¬O°°¸Ë¦¨¤¤Back-Orifice ¯f¬rªº¥D¾÷¡A¤Þ»¤¦bºô¸ô±Mªù±½ºË BO ªº¨ü®`ªÌ¤Wªù¡C[9] ¤¶²Ð¦b FreeBSD ¦p¦ó«Ø¥ß¦p Jail ªºÀô¹Ò¡C

 

2. ¬y¶q¤ÀªR

Thumbprint [11-13]ªºÆ[©À¦b¥¼¨Ó¤J«I½u¯Áªº«Ø¥ß¤W±N¦³·¥¤j§U¯q¡C©Ò¿× Thumbprint ¬O¤ÀªR¤J«IªÌ¦UºØ¿W¯S¥i°Ï¤À¤§¯SÂI¡A¨Ò¦p¨ä¥´¦r³t²v¡B³s½uª¬ªp¡B¨t²Î¯S¦³ª¬ªp¡AÁö¸gºô¸ô¤j¶q traffic µ¥ noise ¼vÅT¡A¤´¥i¸g¹LÂo«á§ä¥X¥i¨ÑÃѧOªº¯S¼x¡C³o¨Ç¯S¼xºÙ¬° Thumbprint¡CÃþ¦üªº¬ã¨s¦³§O©ó¤@¯ëºô¸ôÃÒ¾Ú»`¶°ªº¤èªk[14]¡A¥²¶·ºÊµø¤Î°O¿ý¤J«IªÌ³q¹Lªº©Ò¦³¸ô®|¡A¤Ï¦Ó¦^¨ì¶Ç²Î²{¹êÀô¹Òªº¤èªk¡AºÉ¥i¯à¥u¨Ì¿à¥Ç¸o²{³õ©Ò¿ò¯dªºÃÒ¾Ú¡C

 

[16,17] §ó¥H¬y¶q¤ÀªRªº¤èªk«Ø¥ß passive filter¡A¤ÀªR«D¤¬°Ê port ³s½u«o§e²{¤¬°Ê³s½u¬y¶q¡AÂǦ¹°»´ú«áªùµ{¦¡ªº¦s¦b¡C

 

3. ½]®Ö°O¿ý

¤@¯ë¾D¨ü«áªù¡u¦Ã¬V¡v¤§¨t²Î¡A´N¤£¯à½T«H¥ô¦ó½]®Ö°O¿ýÀÉ¡CBruce Schnier ³Ìªñ«h­P¤O©óForensicsªº¥DÃD[15]¡A¬ã¨s¦p¦ó«OÅ@¤£¦w¥þ¡B©Î¤£¯à§¹¥þ«H¿à¥D¾÷¤Wªº¨t²Î°O¿ý¸ê®Æ¡C

 

¤»¡Bªk«ß³d¥ôÂkÄÝ

1.    µ½·N²Ä¤TªÌªºªk«ß³d¥ô

³Q¸g¥Ñ§ðÀ»¸õªO¥D¾÷¤J«Iªº¨ü®`ªÌ¡A¥i¯à±±§i³Q·í§@¸õªOªº¥D¾÷¾Ö¦³ªÌ¡H­Y¯u¥i¦æ¡A¨Æ¹ê¤W¬O¦bÃg»@¤£¸g¤ßªººô¸ô¥D¾÷ºÞ²zªÌ¡A¦]¬°¦Û¤v¤£¤p¤ßªº«áªG¡A³y¦¨¨ä¥L¤H¨ü®`¡C¦b°ê¥~¬Æ¦Ü¤w¶}©l¦Ò¼{³o¤è­±¥ßªkªº¥i¦æ©Ê[1]¡C³o¤ÏÀ³¥X¥¼¨Óºô¸ô¦w¥þ¤w¸g¤£¦A¬O³æ¯Â«OÅ@¦Û¤vºô¸ô¤£¨ü«I¥Çªº®ø·¥©Ê¨¾Å@¡A§ó­n¥H«OÅ@¥L¤H¨t²Î¤£­P¾D¨ü¨ì·½¦Û¥»¨­ºô¸ôªº§ðÀ»¡]¥ç§Y¬°¤F«OÅ@§O¤H¦Ó§óºÉ¤O«OÅ@¦Û¤v¡^¡C¦ý¦b³d¥ôÂç²M¤W¥i¯à·|¬Û·í½ÆÂø¡C®Ú¾Ú¤W­z¤ÀªR¡A«áªù«ü¥O¡B¦^À³ºÞ¹Dªº«Ø¥ß¥i¤À¬°¥|ºØÃþ«¬¡Aª½±µ¡B¶¡±µ°Ñ»P§ðÀ»¸õªOªº¨t²Î²[»\¼h­±¼sªx¡A¥]¬Aµ½·Nªº¤W¸ü¦øªA¾¹¡BNapster µ¥§Î¦¡ªº peering service¡BFree Homepage provider¡A³o¨Ç«¬ºAªº¤½²³ªA°È³£¥i¯à¦¨¬°³Q°Ê¾Þ±±©R¥Oªº¶Ç»¼¸õªO¡C

 

2.        ¤À´²¦¡§ðÀ»°Ñ»P¥D¾÷ªºªk«ß³d¥ô±´°Q

°ò¥»¤W³o¤´ÄÝ©ó²Ä¤@Ãþªº¤£¸g¤ßºÞ²zªÌ¡]©Î¥Î¤áºÝ¹q¸£¡^¡C¥D­n³d¥ô·íµM¦b©óµ¦°Ê§ðÀ»ªÌ¡A¦ý³Q¾Þ±±¦Ó¥D°Ê°Ñ»P§ðÀ»ªÌ¡A­Y¤£¥[½Ñ¥ô¦ó¦D»@¡A±N¨Ï¥¼¨Ó¤À´²¦¡¸õªO§ðÀ»¤é¯q²±¦æ¡C¥þ¥@¬Éºô»Úºô¸ô¹q¸£Á`¼Æ­Y¥H¤d¸U­p¡AÀ³¸Ó¦³¬°¼Æ¦Ê¸U¥H¤Wªº¹q¸£¤w³Q·tÂþޱ±«áªù¡C¨C¤@¦¸§ðÀ»°Ñ»PªÌ­Y¥H¸U­p¡A¤£¦ý¨ü®`ªÌÃø¥H©Ó¨ü¡A¯u¥¿«ü¨ÏªÌ§óÃø¥H°l¬d¡C³oÃþ³Q¾Þ±±¦Ó°Ñ»P§ðÀ»ªÌÀ³¸Ó¾á­t¥Á¨Æ½ßÀv³d¥ô¡A¯S§OÀ³¸Ó³W½d¤½°È³¡ªù¤Î¾Ç³N¾÷Ãö¾Ç®Õ¡C¤£¹L¦¹Ãþ½ßÀv¤£©yª½±µ¸ÉÀv¨ü®`ªÌ¡A¦Ó¬O±j¨î»Ý¤ä¥I©ó¥[±j¸Ó³æ¦ì¦w¥þºÞ²z¬ÛÃö¸g¶O¡A¤£±o®¿²¾¥L¥Î¡C

 

¤C¡Bµ²½×

 

1. ¼ÒÀÀª¬ªp

¥H¤U¼ÒÀÀ«Ø¥ß¤@­Óªø®É®Äªº¦^À³«áªùºÞ¹D¡C«áªùºÞ¹D«Ø¸mªº°Ñ»PªÌ¥]¬A¡G¤º³¡»s§@ºô­¶¹q¸£(AC)¡]±N¼çÂðT®§¦^À³µ{¦¡¡^¡BFree homepage provider (FHP)¡C§Q¥ÎE-mail overflow attack ¦b AC ¤W´Þ¤J«áªù¡C«áªù¦^À³°T®§±NÁôÂôO©ó AC ©Ò»s§@ºô­¶»P¹ÏÀÉ¡]§Q¥Î¼v¹³ÁôÂç޳N¡^¡C¥~³¡©R¥O¥H¤£¦P§Î¦¡¤À§O¡]1¡^¸m©ó FHP ºô­¶¡C(2) ¸m©ó¤º°e E-mail ¤º²[¡C(3) ÁôÂéóºô¸ô¬y¶q¡C¦¹§Î¦¡ªº«áªù¥i«Ø¥ß©ó¥ô¦ó¥u¡u±µ¦¬¡v E-mail ¦Ó´£¨Ñ Web Content ªº«Ê³¬ºô¸ô¡C¨Æ¹ê¤W AC ¥i¯à¬O¤º³¡ºô¸ôªº¥ô¦ó¤@³¡¹q¸£¡A©Î³\¬O³ß¦n»s§@­Ó¤Hºô­¶ªº³æ¦ì¥DºÞ¡C¤@¥¹«áªù«ü¥O¡B¦^À³³q¹D«Ø¥ß¡A¾Þ±±ªÌ±N¯àÀH¤ß©Ò±ý¹ï¤º³¡ºô¸ô¶i¦æ¶}©ñªÅ¶¡ªº§ðÀ»¦æ°Ê¡C

 

2. ¹ï©ó¥¼¨Óºô¸ô¦w¥þªº½ÄÀ»

­Y 1/10 ªº¹q¸£³£¼çÂæ³«áªùµ{¦¡¡A¤£¥u¤£§Q©ó¥¼¨Ó¹q¤l°Ó°ÈÀô¹Òªº±À®i¡A¦U¥i¯à¦M«æ°ê®a¾ãÅé¸ê°T¦w¥þ¡C³Ì¥i©Èªº«áªùµ{¦¡¬O¼ç¥ñ½¯©µ¡A¦Û°Ê´M¨D³Ì¦X¾Aªº«ü¥O»P¦^À³³q¹D¡C

 

¤K¡B°Ñ¦Ò¤åÄm

1.      Eric J. Sinrod, Combating Internet crimes and threats, November 07, 2000, http://www.upside.com/texis/mvm/upside_counsel?id=3a06fede1

2.      Robert Stone, ¡¨CenterTrack: An IP Overlay Network for Tracking DoS Floods,¡¨ 9th Usenix Security Symposium

3.      David E. Mann and Steven M. Christey, ¡§Towards a Common Enumeration of Vulnerabilities, ¡§ 2nd Workshop on Research with Security Vulnerability Databases, Purdue University, January 21-22, 1999

4.      ¥xÆWºô¸ô¦w¥þ©Êµû¦ô¡A http://www.cert.org.tw

5.      CyberCop Sting http://www.nai.com/international/uk/asp_set/products/tns/ccsting_intro.asp

6.      Deception Toolkit, DTK. http://www.all.net/dtk/

7.      ¡§Do You Need a Honeypot?¡¨. Internet Security Advisor, Nov & Dec. 1999 http://www.advisor.com

8.      FakeBO, http://yi.com/home/KosturjakVlatko/fakebo.htm

9.      Jail(8) in FreeBSD¡¦s System Manager's Manual http://www.FreeBSD.org

10.  To Build a Honeypot, Lance Spitzner. http://www.enteract.com/~lspitz/honeypot.html

11.  Terrance Goan, "A Cop on the Beat: Collecting and Appraising Intrusion Evidence," Communications of the ACM, Vol. 42, No. 7, 1999, pp. 46-52.

12.  Staniford-Chen, S. and Heberlein, L.T. "Holding intruders accountable on the Internet," In Proceedings of the 1995 IEEE Symposium on Security and Privacy (Oakland, CA, 1995), 34-49.

13. L.T. Heberlein, K. Levitt and B. Mukherjee. "Internetwork Security Monitor: An Intrusion-Detection System for Large-Scale Networks," in Proc. 15th National Computer Security Conference pages 262-271, Oct. 1992.

14.  H. T. Jung et al. "Caller identification System in the Internet Environment," In Proc. 4th Usenix Security Symposium, 1993.

15.  Bruce Schneier and John Kelsey, ¡§Secure Audit Logs to Support Computer Forensics,¡¨ ACM Trans. on Information and System Security, Vol. 2, No. 2, May 1999, Pages 159-176.

16. Yin Zhang, and Vern Paxson, ¡§Detecting Backdoors,¡¨ 9th Usenix Security Symposium

17. Yin Zhang, and Vern Paxson, ¡§Detecting Stepping Stones,¡¨. 9th Usenix Security Symposium