¨¾¤î§ðÀ»¸õªO¥D¾÷ªº¦w¥þºÞ²zµ¦²¤ ¶À¥@©ø ¤¤¥¡¬ã¨s°| ¸ê°T¬ì¾Ç¬ã¨s©Ò §U¬ã¨sû ºKn §ðÀ»¸õªO¥D¾÷ªº°ÝÃD¹ï¥Ø«eºô¸ôµ²ºc¤wºc¦¨ÄY«¦w¥þ«Â¯Ù¡A¼ç¥ñªº¦M¾÷±N¶W¹L¤@¯ë¹q¸£¯f¬r¡C¾Úĵ¬F¸p¦D¨Æ§½ªº²Îp¦ôp¡A°ê¤º¬ù¦³¤Q¤À¤§¤@ºô¸ô¥D¾÷³Q´Þ¤J¤ì°¨µ{¦¡¡]§Y§ðÀ»¸õªO©Ò§Q¥Îªº«áªù±J¥D¡^¡C³Ìªñºô¯¸¤J«I¨Æ¥óÀW¶Ç¡A¦h¼Æ»P³Q¾ÞÁaªº¥D¾÷¦³Ãö¡A¦p Yahoo¡BeBay µ¥°Ó¥Îºô¯¸¾D¨ü¤À´²¦¡ªýÂ_§ðÀ»¡]¤j¶q¥D¾÷³Q¦w©ñªýÂ_§ðÀ»µ{¦¡¡^¡ALove-You-Letter »P³Ìªñªº Navidad
¨Æ¥óµ¥«h¬OÓ¤H¹q¸£³Q¥Î¨Ó¶¡±µ´²§G§ðÀ»µ{¦¡¡C¥»¤å±´°Q¦UºØ¸õªO§ðÀ»¤èªk¡A¨¾¤îµ¦²¤¡B¨Ã±´°Q°l¬d§Þ³Nªº¥¼¨Óµo®i¡B¬ÛÃöªk«ß³d¥ôÂkÄݵ¥¡C ÃöÁä¦r: ¸õªO§ðÀ»¡B«áªù¾Þ±±¡BÁô±K³q¹D¡B»¤³´°õ¦æÀô¹Ò¡B¦æ¬°«ü¯¾¡C ¤@¡B§ðÀ»¸õªO»Pºô¸ô¦w¥þ«Â¯Ù ³Ìªñ·L³n¤½¥qµ{¦¡½X¾DÅÑ¡A¦h³B°Ó°Èºô¯¸±Á{¤À´²ªýÂ_§ðÀ»¡A¬ü°ê¦U¤j¾Ç¯É¾D¤j³W¼Ò¥þ±¤J«I¡C³o¨Ç³£¤ÏÀ³¸ê°T¦w¥þ«Â¯Ù¤wÄY«¼vÅT¤j²³ªº¤é±`¥æ©ö©¹¨Ó¡C®Ú¾Ú TW-CERT 88 ¦~ªº°ê¤ºWeb server ¦~«×¦w¥þ½Õ¬d[4]¡A¦³ 53 % ªº¥D¾÷¥i³Q¨ú±o Web Admin ªºÅv¡C§Ú̪ñ¤éªº¦Û§Ú¦w¥þÀË´ú¾÷¨îªº°O¿ý¦³Åã¥Ü¦³°ª¹F 59% ¾÷¾¹¦³µ{«×¤£µ¥ªº¦w¥þ¯Ê³´¡C¦]¦¹¦D¨Æ§½ªº¡u¤ì°¨¡v¥D¾÷¦ôp¤ñ²v(1/10)¨Ã¤£ºâ°ª¦ô¡A¦]¬°¥un¦³¤ßªº¤J«IªÌ³£¥i¯à¦b53% ªº¥D¾÷¤¤´Þ¤J¡u«áªù¡v¡C ¦ý¤@¯ë¤H¹ï©ó¦w¥þĵı³£«]©ó¡u¥iµø¡v©Î¡u¥i¹îı¡vªº¦w¥þ«Â¯Ù¡A¨Ò¦pºô¶¾DP«§ï¡A©Î¸ê®Æ³Q·´·l¡C¥h¦~¤K¤ë¬F©²ºô¯¸³Q¤jÁ|¶î´«ºô¶¡A¦U¬É¯ÉªíÃö¤Á¡A¤½Å¥¡B®y½Í·|¤£Â_Á|¦æ¡A¦ý¨Æ¶È©ó¦¹¡C¤µ¦~¤Q¤ë°ê¼yºô¸ôÁÁ¶Ç±N¦³Ãþ¦ü¨Æ¥ó«ºt¡A¨Æ«á¶È¦³¹s¬Pºô¯¸¦³ºô¶³Q§ï¸ñ¶H¡A¦]¦¹¤j®a¼y©¯¤£¤w¡A§ó²`«H¦¹¬°¡uÁÁ¶Ç¡v¡C¦ý±¡ªp¯u±o¦p¦¹¼ÖÆ[¶Ü¡H®Ú¾Ú§Ú̲`¤J½Õ¬d¡A¦b³æ¤@¾÷Ãö¤º¦³¦s¦b¦UºØ¤£¦P§Î¦¡«áªùªº¥D¾÷¡A¤ñ¨Ò¹F 50%¡C³o¼Ëªº¤ñ¨Òè¦n¤ÏÀ³ TW-CERT ¦~«×¦w¥þ½Õ¬d¼Æ¾Úªº¥i«H«×¡G¥ç§Y³o¨Ç¥i¯à³Q¨ú±o admin shell ªº¥D¾÷¡A³£¦³¬YºØ§Î¦¡ªº«áªùµ{¦¡ÁôÂè䤤¡C 1.
¥¼¨Ó§ðÀ»ÁÍ¶Õ ¥¼¨Óºô¸ô¦w¥þ«Â¯Ù³£±N»P«áªù«Ø¥ß®§®§¬ÛÃö¡A¥]¬A¡G n §ðÀ»«á·tÂÃÁô±K¾Þ±±«áªù ³o¬Oºô¸ô§ðÀ»ºë½o¤Æªº¥²µMµo®i¡C¥ç§Y½ÆÂøªº§ðÀ»¹Lµ{±N¤À¶¥¬q¡A©ÎºÙ¬°§ðÀ»ª¬ºA§Ö¨ú (Attack Process Cache)¡A¦b¤J«I¥Øªº¹F¦¨¤§«e¡A¥Î¨Óºûô«e¦¸§ðÀ»³~®|ªººZ³q¡C n «áªù»P¯f¬r·P¬V´C¤¶¾ã¦X «áªùµ{¦¡±N»P¯f¬r·P¬V¤è¦¡¤¬¬Û¾ã¦X¡C¶Ç²Î¯f¬r¬O¦P¨B«D¾Þ±±¼Ò¦¡¡A¥ç§Y¥u¯à¨Ì¿à¨Æ¥ó¦P¨B¡]¦p13¤é¬P´Á¤¡^¡A¥H¤Þµo´c·N«ü¥O¡C¦ý«áªùµ{¦¡ªº¯S©Ê¬O«D¦P¨B¾Þ±±¼Ò¦¡¡AÀH®É¥i¯àIJµo´c·N«ü¥O¡C n ¤À´²¦¡¡B¤j³W¼Ò¶¡±µ§ðÀ» ³Ì¨å«¬ªº¹ê¨Ò¬O¤À´²¦¡ªýÂ_§ðÀ»(Distributed Denial of Service)¡A§Q¥Î¤j¶q¤À´²©ó¦U¦aºô¸ôªº¥Î¤á¥D¾÷¡A¦P®É±Ò°Ê§ðÀ»¡C«áªùµ{¦¡ªº¹B¥Î¬O¤À´²¦¡§ðÀ»«nªº¤@Àô¡C 2. «Ø¥ß«áªù¤§¥Øªº n
ÅѨú¸ê·½§Q¥Î¡A¨Ò¦pºô¸ôÀW¼e¡]³]¸m http proxy
server¡^ ´²§G¦U¦a¹q¸£ªº«áªù¡A¬°¼Æ¬Æ¦h¬O¥Î¨ÓÅѨú¸ê·½¡A¥]¬A Web access »P E-mail Relay¡A¥H¨ú±oÄ_¶Qªººô¸ô¸ê·½¡CÁ|¤¤¬ã°|¬°¨Ò¡A¹ï¥~ÀW¼e¥R¨¬¡A¬O¦³¥ø¹Ï¥Î¤á«I¤Jªº³Ì¤j»¤¦]¡C¦U¤j ISP ¦P¼Ë±Á{Ãþ¦ü«Â¯Ù¡C¨Æ¹ê¤W¡A³o¼Ëªº¥Ç¸o§ÎºA¦p¦Pµs¥´¹q¸Ü¡A¥iÂÇ¥H¸`¬Ùºô¸ô¨Ï¥Î¶O¥Î¡C n
«D¦P¨B§ðÀ»ª¬ºA§Ö¨ú ºûÅ@ª¬ºA§Ö¨ú(cache)±N¥i§Ö³t¨ú±o¤W¦¸§ðÀ»ª¬ºA¡A¥iÀ³¥I½ÆÂøªº¤J«Ipµe¡A¨Ò¦p§ðÀ»¥i¨Ì¾Ú¥Ø¼ÐÅv®t²§¡A¥ý¨ú±o§CÅv¥Î¤á¹q¸£¦s¨úÅv¡A¦Aº¥¶i´x±±°ªÅv¥Î¤á¡A¶i¦Ó¤J«I«n¦øªA¾¹¡C¶¶§Ç¤W¡A¬°§CÅv¸ê°T¥Î¤á¢w> °ªÅv¸ê°T¥Î¤á ¢w> ´¶³q¦øªA¾¹±b¸¹ ¢w> ºÞ²zªÌÅv±b¸¹¡C¨C¤@¶¥¬qªº§ðÀ»ª¬ºA§Ö¨ú¥iºûô¤J«IºÞ¹DªººZ³q¡C n
³]¥ß§ðÀ»¸õªO ¶¡±µ§ðÀ»¥iÁ×§K³Q°l¬d¡A¦P®É¾Þ±±¤j¶q§ðÀ»¸õªO¡A¥H¤£¦P¨Ó·½¦ì§}¹F¨ì´ÛÄF¬y¶qºÞ²z¨t²Î¥Øªº¡A¶i¦Ó§Î¦¨¤À´²ªýÂ_§ðÀ»¡C 3. «áªùµ{¦¡«I¤J¤è¦¡ ¤@¯ë§ðÀ»«á´Þ¤J «áªù´Þ¤Jªº³Ì¨Î±J¥D¬O¹ï©ó¡u¦w¥þ¡v¤£¸g¤ßªº¨Ï¥ÎªÌ¡C²Ä¤@Ãþ¬OºÞ²z¤£µ½ªº¦øªA¾¹¡C²Ä¤GÃþ¬O¸ê°T½Ã¥Í²ßºD¤£¨}ªº¥Î¤áºÝ¹q¸£¡C¥¼¨Ó±Á{ªº³Ì¤j«áªù«Â¯Ù±N¨Ó¦Û¥Î¤á¨t²Î¡C¹ï©ó¥Î¤á¨t²Î³Ì¤j«Â¯Ù¥]¬A¡G n
E-mail: ¯f¬r¡B´c·N°õ¦æÀɧ¨±a¨Ã¤£¥i©È¡C²{¦b³Ì¨ã«Â¯Ùªº¬O¨Ï E-mail ±µ¦¬³nÅé²£¥Í°O¾ÐÅé·¸¼g§ðÀ»ªº´c·N±±¨îÀÉÀY(header)¡A³oÃþ§ðÀ»ªº¯S©Ê¬O¥un¥Î¤á±µ¦¬ E-mail¡A¤£¥²¶}±Ò´N·|·P¬V¡C³o¬O¥i¥H¬ð¬ï¥ô¦óÄY±K¨¾¤õÀ𪺧ðÀ»¡C n
Web Content: malicious
Script/Applet ¡C n
Document Contents: ²z½×¤W©Ò¦³®æ¦¡ªºÀɮ׳£¼çÂæM¾÷¡A¥i¨ÏÀ³¥Îµ{¦¡²£¥Í¯Ê³´¡A¶i¦Ó°õ¦æ«Dªk«ü¥O¡C³oºØ§ðÀ»¥i¥H¬ð¯}¹êÅéºô¸ô¹jµ´¡C ¤H¦]¯Ê³´(social engineering) n
¹ê»Ú¬° Script ©Î¥i°õ¦æÀɮסA¦ýÁôÂì° .txt .jpg .gif ÀɦW¡C n
¥H¼ôÃѪB¤Í¨¥÷¡AE-mail §¨±a´c·N¥i°õ¦æ¤º²[¡C 4. °»´ú«áªùµ{¦¡ªº§xÃø©Ê ¤@¥¹¾D¨ü§ðÀ»¡A¬°½T«O¨t²Î¤£³Q¸m¤J«áªùµ{¦¡¡AY¨Æ¥ý¨S¦³°O¿ý¦UÀɮתº½]®Ö½X (checksum)¡A©Ò¦³¥i°õ¦æÀÉ¡B¨t²Î³]©w³£n«·s¦w¸Ë¡A¦]«áªùµ{¦¡²z½×¤W¥i¤Æ¨¬°²{¦sªºÀ³¥Îµ{¦¡¡A¬Æ¦Ü²`¤J¨t²Î®Ö¤ß¡A¥i¼ÒÀÀì§@·~¤è¦¡¡A¨Ï¨t²Î¹B§@¦p±`¡A«ÜÃøµoı¨ä¦s¦b¡C¤@¯ë°»´ú³nÅé¶È¯à°»´ú¡u³Q°Ê³s½u¡v¤è¦¡ªº«áªù¡A°»´ú²v»P»~¥¢²v³£«ÜÃø¦X¥G»Ý¨D¡A¦]³Q°Ê³s½uªº port ¦ì§}¥i¥ô·N§ó°Ê¡A³s½u¨ó©w§óÀHµÛ¹B¥ÎªÌ¤£¦P¡A¥i»´©ö§ó§ï¡C¥¼¨Ó«áªùµ{¦¡ªºÅܲ§µ{«×»Pµo®i³t«×±N»·°ª©ó¤@¯ë³æ¯Â¹q¸£¯f¬r¡C 5. µo²{«áªùªº¨Æ¨Ò §Ṳ́w²³æ»¡©ú§ðÀ»ÁͶջP«áªù«Ø¥ßªºÃö«Y¡B¥Øªº¡B»P´Þ¤J¤è¦¡¡C¦¹½×¤åªº°Ê¾÷·½¦Û³Ìªñ¦b³]©w firewall ®É¡A¦]°l¬d²§±`¬y¶q·½¤~Ååı«áªùµ{¦¡¥ÆÀݪºÄY«©Ê¡C¦b firewall ¸Ì±¦³¤@¥x«Ü³æ¯Âªº¦øªA¾¹¡A¥u´£¨Ñ«H¥óÂà°e»P°ì¦W¬d¸ß¤Î©e¥ô¡A¦]¦¹°£¤º¹ï¥~ udp port 53 ¡A¥~¹ï¤º udp port 53¡B tcp port 25 ¶}©ñ¡A¨ä¥L port ¤£¸Ó¦³¬y¶q¡C¦ý´N¦b·sªº¦w¥þ¬Fµ¦¬I¦æªºÀþ¶¡¡A¤j¶q«Ê¥]³Q©Úµ´¶Ç°e¡C§Ú̦]¦¹ÃhºÃ«áªùµ{¦¡¤w«I¤J¡C¨Ï¥Î lsof (list opened file) ¤ñ¹ï¦Uµ{§Ç»P©Ò»ÝªA°È¦ì§}¡A¤~§ä¥XÁô¨¬°¥¿±`ªº¦øªAÀ³¥Î¨t²Î¡C³o¬O¤@¤ä³Q°Ê³s½u«¬ªº»·ºÝ¾Þ±± root shell¡C ¤G¡B«áªù¦w¸Ë«¬ºA»P¸õªO¤è¦¡ 1. «O¯d²{¦³©Î¦w¸Ë¦³¦w¥þ¯Ê³´ªA°È³nÅé¡B³]©w(Vulnerable Service¡BConfiguration) ³Ì¨Îªº«áªù¬O«O¯d¦³¦w¥þ¯Ê³´ªºªA°È³nÅé¡A¦ýÅý¨Ï¥ÎªÌ»~¥H¬°©Ò¥Îªº¬O³Ì·s¨S¦³¯Ê³´ªºª©¥»¡C¦]¦¹²z½×¤W¦³¦w¥þ¯Ê³´ªºªA°È³nÅé¡AY¥i¾Ú¥H¨ú±o¨t²Î¦s¨úÅv¡A³£¥iµø¬°¡u«áªù¡v¡C n
´ÛÄF¸É±jµ{¦¡¡G¤J«IªÌP¤O©ó×§ï¦w¸Ë³]©wÀÉ¡A§ó·s¸É±jª©¥»¸ê°TÅã¥Ü°T®§¡A¦ý¨ã¯Ê³´³nÅéºû«ù¤£ÅÜ¡C n
´ÛÄF¦w¥þÀË´úµ{¦¡¡G½s¿è°õ¦æÀÉ¡A§ó§ïª©¥»Åã¥Ü¸ê°T¡C¥]¸ËªA°È³nÅé (wrapper)¡A¹LÂoÄdºI¨ó©w¿é¥X¤J¤¤§t¦³¯S©wÀË´ú¦r¦ê¸ê®Æ¡]¦p±`¥Î¦w¥þ®zÂI±½ºË¨t²Î¡B¤ñ¹ï¹ï©ó¬YºØ CVE[3] ªºÀË´ú¤è¦¡¡^¡A¥OÀË´úµ{¦¡»~§P¡C 2.
¸m´«²{¦³ªA°È³nÅé¡Aºû«ù¨ä즳¨ó©w¹B§@¥¿±` ³Ì¦³¦Wªº«áªù¬O Ken Thompson ¦b¨ä¦´Áµo®iªº
Unix login µ{¦¡¤¤ÁôÂáu·tªù¡v¡A·í¿é¤J¯S©w¦WºÙ®É¡A¥i¨ú±o¶WÅv±ÂÅv¡C¦]¦¹§ó§ï login µ{¦¡¬O©ñ«áªù³Ì§Öªº³~®|¡A±N¨Ï©Ò¦³¤¬°Ê¦¡»·ºÝ³s½uµ{¦¡¦p telnet/rlogin µ¥ºû«ù즳¹B§@¥¿±`¡A¦ý¦b¯S©w¿é¤J®É±N¶}±Ò«D¥¿·í±ÂÅvªºÅv¡C 3.
«D¬J¦³ªA°È¡A¥t¦w¸Ë¾Þ±±ªA°È ³o¬O¥Ø«e³Ì¬y¦æªº«áªù¾Þ±±¤è¦¡¡AµS¦p»·ºÝ¾Þ±±Ó¤H¹q¸£¡A¦ý¤]³Ì®e©ö³Q°»´ú¥X¨Ó¡C¤@¯ë¯f¬r°»´úµ{¦¡³£¯à§ä¥X³oÃþªº«áªù¡C ¤T¡B«Ø¥ßÁô±K¾Þ±±³q¹D n«Ø¥ßÁô±K¾Þ±±³q¹D¡A¥i¤À§O«Ø¥ß¡]1¡^¾Þ±±«ü¥O³q¹D(Command Tunnel, C
Tunnel)¡A¡]2¡^¦^À³°T®§³q¹D(Response Tunnel, R Tunnel)¡C¤GªÌ¥i¬Û¨Ì©Î¿W¥ß¡C³o¨âºØ³q¹D¤S¤À§O¥i¥Ñ¾Þ±±ªÌ¥D°Ê(Active Controller)/³Q°Ê(Passive Controller)¡A»P¨ü±±ªÌ¥D°Ê(Active Responder)/³Q°Ê(Passive Responder)¡C¥H (C Tunnel, R Tunnel) ªí¥Ü¡AType I: (Active
Controller, Active Responder), Type II:(Passive Controller, Active
Responder), Type III:(Active Controller, Passive Responder), Type IV:(Passive
Controller, Passive Responder)¡C 1.
Type I Tunnel ³o¬O¤@¯ë«Ø¥ß³Q°Ê³s½u (Passive Tunnel, forward shell)ªº¤è¦¡¡C¦b¨ü±±¤è¡]³Q±H±JºÝ¡^°õ¦æ«áªù«ü¥O±µ¦¬ªA°Èµ{¦¡¡]©ó¯S©wªA°È¦ì§}¡^¡A³o¬O³Ì¼sªx¦s¦bªº¾ÞÁa¤è¦¡¡A§Î¦¨·tÂ꺦øªA¨t²Î¡C³o¬O¤@¯ë¤¬°Ê¦¡ªº²×ºÝªA°Èµ{¦¡¦p telnetd/rlogind µ¥§Î¦¡ªº«áªù¡Cºô¸ô¨¾¤õÀð§Y¥iªý¾×³oÃþªº¾Þ±±³q¹D¡C¡]¨¾¥~©¹¤º¬y¶q¡^ 2. Type II Tunnel ³o¬O¨ü±±ªÌ¥D°Ê¶Ç»¼¸ê®Æ (Active Tunnel, reverse shell)ªº¾Þ±±¤è¦¡¡A¤@¯ë³£¬O¥H http/ftp µ¥¦Xªk¹ï¥~¨ó©w¡A«Ø¥ß tunnel (¦p©Ò¦³¹ï¥~³s½u³£¸g¥Ñ http)¡A§Î¦P«Ø¥ß¥H http «Ê¥]Äâ±a¼h¡Aºc«ØµêÀÀ±MÄݺô¸ô¡C n
Reverse Shell n
Valid Protocol Tunnel
for VPN n
¨¾¤õÀ𥲶·¨¾Å@¤º©¹¥~¬y¶q¡C 3.
Type III Tunnel ¾Þ±±ªÌ¹ï¤º³¡ºô¸ô°e«ü¥O«Ê¥]¡A¨Ã¥H¶¡±µ¤èªk±µ¦¬¦^À³°T®§¡C 4.
Type IV Tunnel ¾Þ±±ªÌ±N«ü¥O¸m©ó¥~³¡¤½²³ºô¸ô¡A¨Ò¦p¸g´x±±¤§¤J¤fºô¯¸ªººô¶¡C¨ü¾Þ±±ªÌ¦A±N¦^À³¸m©ó¥~³¡´£¨Ñ¤W¸üÀÉ®× ftp ¦øªA¾¹¡C 5.
¯S®íªº Command Tunnel »P Response Tunnel 5. Command Tunnel 1. ¤º°e E-mail ¤º²[·tÂëü¥O (with Terminal
Invisible Text string) 2. ¤º°e¯S®í¨ó©w·tÂëü¥O¡A¨Ò¦p ICMP unused option (echo request, echo reply, port unreachable, host
unreachable µ¥) 3. ¥~³¡¤J¤fºô¯¸ Web Page ·tÂëü¥O 4. ¤º³¡ºô¸ô¬y¶q·tÂëü¥O Response Tunne1.
¼v¹³·tÂæ^À³¸ê®Æ (Information Hiding) 2.
¥~°e E-mail ¤º²[·tÂëü¥O ¤Wz«ü¥O©Î¦^À³³q¹D³£¥i¸g¥[±K³B²z¡C ¥|¡B¨¾¿mµ¦²¤ n
¤@¯ë©Ê«OÅ@¡]general protection¡^ 1. vulnerable host ¸T¤î¥~¹ï¤º/¤º¹ï¥~³s½u¡C»P¦w¥þÀË´úµ{¦¡°t¦X (Vulnerability Scanner/Auditor)¡AY¤@ÀË´ú¦³¦w¥þ¯Ê³´¡A°¨¤W»P firewall policy service ³s½u¡A©Úµ´©Ò¦³¤º¥~³s½u¡C 2.
«áªùµ{¦¡°»´ú (backdoor detection) Active Detection
n
¥Î¥H°»´ú passive tunnel ªº¦s¦b Passive Detection
n
¥Î¥H°»´ú
active tunnel (reverse shell) ªº¦s¦b¡C n
°»´ú well known protocol port number¡A°O¿ý«D¦Xªk¨ó©w«Ê¥]¡B¨Ó·½¤Î¥Øªº¦ì§}¡C n
°»´ú«D Interactive protocol port number¡A°O¿ý«D Interactive ¦æ¬°«Ê¥]¡C[16,17] n
¥Î¤áºÝ«OÅ@±¹¬I¡]Client Protection¡^ 1.
Sendmail SMTP authentication ¦¹±¹¬I¥i¹w¨¾Ãþ¦ü Melissa ¡BLove-letter¡BNavidad µ¥«H¥ó³sÂ근ɪº«áªù§ðÀ»¡C¦ý¥²¶·Äµ§i¨Ï¥ÎªÌ¤£n°O¾Ð»{ÃÒ±K½X¡C 2.
Delay sent of Outgoing E-mail 3.
Security Policy Enforcement n
¥~¹ï¤º¡G©Úµ´©Ò¦³³s½u (Not established) n
¤º¹ï¥~¡G¥u¶}©ñ¤¹³\¨Ï¥ÎªA°Èªº port ¦ì§}¡A¨Ã¥H application proxy ¤è¦¡¡AÀˬd³s½u«Ê¥]¡A©Úµ´«D¥¿½T¨ó©w«Ê¥]ªº¶Ç»¼¡C¦ý¬°¤F©Úµ´¥H¯S©w¨ó©w§@¬°µêÀÀ±M½u©³¼h¨ó©wªº tunnel ³s½u¡A¥²¶·¥H²§±`¤ÀªR¾÷¨îºÊ±±¡C³o¤è±ªººÊ±±¤èªk©|«Ý¸Ñ¨M¡C¦]¬° tunnel «Ê¥]¥H¦Xªkªº¨ó©w¹ï¥~¡A·¾³qªº«Ê¥]¶q»PÀW²v¤]¯à±±¨î¦b¦X²z½d³ò¡]¥u¬O°§C¾Þ±±ªÌªº¦^À³³t²v¡^¡A¦]¦¹¤£©ö°»´ú¡C n
¦øªAºÝ«OÅ@±¹¬I ¡]Server Protection¡^ 1. all open files are monitored 2. «Ø¥ß¦øªA¾¹ÀÉ®×½]®ÖÀˬd°O¿ý (¦p tripwire) 3. Security Policy Enforcement: n
¥~¹ï¤º¡G¥u¶}©ñ¦øªA¾¹ªA°È port ¦ì§}¡]¦p E-mail smtp tcp port 25¡^¡A¥B¥H application proxy ¤è¦¡±µ¨ü³s½u¡A©Úµ´«D¥¿½T¨ó©w«Ê¥]¡]¦p udp port 53 ¥u¤¹³\ DNS packet¡A¥á±ó¨Ã°O¿ý¨ä¥L©Ò¦³«D DNS ¡B¤£¦Xªk«Ê¥]¡A±Ä¨ú³o¼Ëªº±¹¬I±N¥iÁ×§K¥D°Ê°T®§«áªù¸g¥Ñ port 53 ¶Ç»¼¤Ï¦V shell «Ê¥]¡C¡^ n
¤º¹ï¥~¡G©Úµ´©Ò¦³³s½u (Not established)¡C n ¤¡B°l¬d§Þ³Nªºµo®i 1. »¤³´¸Ë¸m¨t²Î »¤³´ªº¥Øªº¬O°l¬d¤J«I¨Ó·½¡C¥Ø«eºô¸ô¥Ç¸o¯}®×²v¬Û·í§C¡A»¤³´»P°lÂܪº¬ÛÃö©Ê»P«n©Ê©úÅã¥i¨£¡A¤@¯ë«ØÄ³ªº¤èªk¬O«Ø¥ß¦U«nºô¸ô¥X¤fºÊµø¨t²Î¡A¨Ã°t¦XºôºÞ¨t²Î¡A«Ø¥ß§Y®É caller ID °lÂÜ¡C ³o¤è±ªº¦¨ªG¥Dn¬O NAI[5]ªº CyberCop Sting Server¡A¨ã¦³¼Ò¥é Windows NT¡BSolaris¡B¥H¤Î Cisco Routerµ¥§@·~Àô¹Ò¡C[7,10]¬O¦p¦ó«Ø¸m Honey Pots Àô¹Ò¡A[6] «h¬O§ó°Ê Inetd ©Î©Ò¦³·|¬ªº|¨t²Î¸ê°Tªº¦a¤è¡AÅã¥Ü¥O¤J«IªÌ²V²cªº¸ê°T¡A¨Ò¦pì¬O
Linux ¡A«h´«¸Ë¬° FreeBSD ©Î Solaris¡C[8] ¬O°°¸Ë¦¨¤¤Back-Orifice
¯f¬rªº¥D¾÷¡A¤Þ»¤¦bºô¸ô±Mªù±½ºË BO ªº¨ü®`ªÌ¤Wªù¡C[9]
¤¶²Ð¦b FreeBSD ¦p¦ó«Ø¥ß¦p Jail ªºÀô¹Ò¡C 2.
¬y¶q¤ÀªR Thumbprint
[11-13]ªºÆ[©À¦b¥¼¨Ó¤J«I½u¯Áªº«Ø¥ß¤W±N¦³·¥¤j§U¯q¡C©Ò¿× Thumbprint ¬O¤ÀªR¤J«IªÌ¦UºØ¿W¯S¥i°Ï¤À¤§¯SÂI¡A¨Ò¦p¨ä¥´¦r³t²v¡B³s½uª¬ªp¡B¨t²Î¯S¦³ª¬ªp¡AÁö¸gºô¸ô¤j¶q traffic µ¥ noise ¼vÅT¡A¤´¥i¸g¹LÂo«á§ä¥X¥i¨ÑÃѧOªº¯S¼x¡C³o¨Ç¯S¼xºÙ¬°
Thumbprint¡CÃþ¦üªº¬ã¨s¦³§O©ó¤@¯ëºô¸ôÃÒ¾Ú»`¶°ªº¤èªk[14]¡A¥²¶·ºÊµø¤Î°O¿ý¤J«IªÌ³q¹Lªº©Ò¦³¸ô®|¡A¤Ï¦Ó¦^¨ì¶Ç²Î²{¹êÀô¹Òªº¤èªk¡AºÉ¥i¯à¥u¨Ì¿à¥Ç¸o²{³õ©Ò¿ò¯dªºÃÒ¾Ú¡C [16,17] §ó¥H¬y¶q¤ÀªRªº¤èªk«Ø¥ß passive filter¡A¤ÀªR«D¤¬°Ê port ³s½u«o§e²{¤¬°Ê³s½u¬y¶q¡AÂǦ¹°»´ú«áªùµ{¦¡ªº¦s¦b¡C 3.
½]®Ö°O¿ý ¤@¯ë¾D¨ü«áªù¡u¦Ã¬V¡v¤§¨t²Î¡A´N¤£¯à½T«H¥ô¦ó½]®Ö°O¿ýÀÉ¡CBruce Schnier ³Ìªñ«hP¤O©óForensicsªº¥DÃD[15]¡A¬ã¨s¦p¦ó«OÅ@¤£¦w¥þ¡B©Î¤£¯à§¹¥þ«H¿à¥D¾÷¤Wªº¨t²Î°O¿ý¸ê®Æ¡C ¤»¡Bªk«ß³d¥ôÂkÄÝ 1.
µ½·N²Ä¤TªÌªºªk«ß³d¥ô ³Q¸g¥Ñ§ðÀ»¸õªO¥D¾÷¤J«Iªº¨ü®`ªÌ¡A¥i¯à±±§i³Q·í§@¸õªOªº¥D¾÷¾Ö¦³ªÌ¡HY¯u¥i¦æ¡A¨Æ¹ê¤W¬O¦bÃg»@¤£¸g¤ßªººô¸ô¥D¾÷ºÞ²zªÌ¡A¦]¬°¦Û¤v¤£¤p¤ßªº«áªG¡A³y¦¨¨ä¥L¤H¨ü®`¡C¦b°ê¥~¬Æ¦Ü¤w¶}©l¦Ò¼{³o¤è±¥ßªkªº¥i¦æ©Ê[1]¡C³o¤ÏÀ³¥X¥¼¨Óºô¸ô¦w¥þ¤w¸g¤£¦A¬O³æ¯Â«OÅ@¦Û¤vºô¸ô¤£¨ü«I¥Çªº®ø·¥©Ê¨¾Å@¡A§ón¥H«OÅ@¥L¤H¨t²Î¤£P¾D¨ü¨ì·½¦Û¥»¨ºô¸ôªº§ðÀ»¡]¥ç§Y¬°¤F«OÅ@§O¤H¦Ó§óºÉ¤O«OÅ@¦Û¤v¡^¡C¦ý¦b³d¥ôÂç²M¤W¥i¯à·|¬Û·í½ÆÂø¡C®Ú¾Ú¤Wz¤ÀªR¡A«áªù«ü¥O¡B¦^À³ºÞ¹Dªº«Ø¥ß¥i¤À¬°¥|ºØÃþ«¬¡Aª½±µ¡B¶¡±µ°Ñ»P§ðÀ»¸õªOªº¨t²Î²[»\¼h±¼sªx¡A¥]¬Aµ½·Nªº¤W¸ü¦øªA¾¹¡BNapster µ¥§Î¦¡ªº peering service¡BFree Homepage provider¡A³o¨Ç«¬ºAªº¤½²³ªA°È³£¥i¯à¦¨¬°³Q°Ê¾Þ±±©R¥Oªº¶Ç»¼¸õªO¡C 2.
¤À´²¦¡§ðÀ»°Ñ»P¥D¾÷ªºªk«ß³d¥ô±´°Q °ò¥»¤W³o¤´ÄÝ©ó²Ä¤@Ãþªº¤£¸g¤ßºÞ²zªÌ¡]©Î¥Î¤áºÝ¹q¸£¡^¡C¥Dn³d¥ô·íµM¦b©óµ¦°Ê§ðÀ»ªÌ¡A¦ý³Q¾Þ±±¦Ó¥D°Ê°Ñ»P§ðÀ»ªÌ¡AY¤£¥[½Ñ¥ô¦ó¦D»@¡A±N¨Ï¥¼¨Ó¤À´²¦¡¸õªO§ðÀ»¤é¯q²±¦æ¡C¥þ¥@¬Éºô»Úºô¸ô¹q¸£Á`¼ÆY¥H¤d¸Up¡AÀ³¸Ó¦³¬°¼Æ¦Ê¸U¥H¤Wªº¹q¸£¤w³Q·tÂþޱ±«áªù¡C¨C¤@¦¸§ðÀ»°Ñ»PªÌY¥H¸Up¡A¤£¦ý¨ü®`ªÌÃø¥H©Ó¨ü¡A¯u¥¿«ü¨ÏªÌ§óÃø¥H°l¬d¡C³oÃþ³Q¾Þ±±¦Ó°Ñ»P§ðÀ»ªÌÀ³¸Ó¾át¥Á¨Æ½ßÀv³d¥ô¡A¯S§OÀ³¸Ó³W½d¤½°È³¡ªù¤Î¾Ç³N¾÷Ãö¾Ç®Õ¡C¤£¹L¦¹Ãþ½ßÀv¤£©yª½±µ¸ÉÀv¨ü®`ªÌ¡A¦Ó¬O±j¨î»Ý¤ä¥I©ó¥[±j¸Ó³æ¦ì¦w¥þºÞ²z¬ÛÃö¸g¶O¡A¤£±o®¿²¾¥L¥Î¡C ¤C¡Bµ²½× 1. ¼ÒÀÀª¬ªp ¥H¤U¼ÒÀÀ«Ø¥ß¤@Óªø®É®Äªº¦^À³«áªùºÞ¹D¡C«áªùºÞ¹D«Ø¸mªº°Ñ»PªÌ¥]¬A¡G¤º³¡»s§@ºô¶¹q¸£(AC)¡]±N¼çÂðT®§¦^À³µ{¦¡¡^¡BFree homepage provider (FHP)¡C§Q¥ÎE-mail overflow
attack ¦b AC ¤W´Þ¤J«áªù¡C«áªù¦^À³°T®§±NÁôÂôO©ó AC ©Ò»s§@ºô¶»P¹ÏÀÉ¡]§Q¥Î¼v¹³ÁôÂç޳N¡^¡C¥~³¡©R¥O¥H¤£¦P§Î¦¡¤À§O¡]1¡^¸m©ó FHP ºô¶¡C(2) ¸m©ó¤º°e E-mail ¤º²[¡C(3) ÁôÂéóºô¸ô¬y¶q¡C¦¹§Î¦¡ªº«áªù¥i«Ø¥ß©ó¥ô¦ó¥u¡u±µ¦¬¡v E-mail ¦Ó´£¨Ñ Web Content ªº«Ê³¬ºô¸ô¡C¨Æ¹ê¤W AC ¥i¯à¬O¤º³¡ºô¸ôªº¥ô¦ó¤@³¡¹q¸£¡A©Î³\¬O³ß¦n»s§@Ó¤Hºô¶ªº³æ¦ì¥DºÞ¡C¤@¥¹«áªù«ü¥O¡B¦^À³³q¹D«Ø¥ß¡A¾Þ±±ªÌ±N¯àÀH¤ß©Ò±ý¹ï¤º³¡ºô¸ô¶i¦æ¶}©ñªÅ¶¡ªº§ðÀ»¦æ°Ê¡C 2. ¹ï©ó¥¼¨Óºô¸ô¦w¥þªº½ÄÀ» Y 1/10 ªº¹q¸£³£¼çÂæ³«áªùµ{¦¡¡A¤£¥u¤£§Q©ó¥¼¨Ó¹q¤l°Ó°ÈÀô¹Òªº±À®i¡A¦U¥i¯à¦M«æ°ê®a¾ãÅé¸ê°T¦w¥þ¡C³Ì¥i©Èªº«áªùµ{¦¡¬O¼ç¥ñ½¯©µ¡A¦Û°Ê´M¨D³Ì¦X¾Aªº«ü¥O»P¦^À³³q¹D¡C ¤K¡B°Ñ¦Ò¤åÄm 1. Eric J. Sinrod,
Combating Internet crimes and threats, November
07, 2000, http://www.upside.com/texis/mvm/upside_counsel?id=3a06fede1 2. Robert Stone, ¡¨CenterTrack: An IP Overlay Network for Tracking DoS Floods,¡¨ 9th Usenix
Security Symposium 3. David E. Mann and Steven M. Christey, ¡§Towards
a Common Enumeration of Vulnerabilities, ¡§ 2nd Workshop on
Research with Security Vulnerability Databases, 4. ¥xÆWºô¸ô¦w¥þ©Êµû¦ô¡A http://www.cert.org.tw 5. CyberCop Sting http://www.nai.com/international/uk/asp_set/products/tns/ccsting_intro.asp 6. Deception
Toolkit, DTK. http://www.all.net/dtk/ 7. ¡§Do
You Need a Honeypot?¡¨.
Internet Security Advisor, Nov & Dec. 1999 http://www.advisor.com 8. FakeBO, http://yi.com/home/KosturjakVlatko/fakebo.htm 9.
Jail(8) in FreeBSD¡¦s System Manager's
Manual http://www.FreeBSD.org 10.
To Build a Honeypot,
Lance Spitzner. http://www.enteract.com/~lspitz/honeypot.html 11.
Terrance Goan, "A
Cop on the Beat: Collecting and Appraising Intrusion Evidence,"
Communications of the ACM, Vol. 42, No. 7, 1999, pp. 46-52. 12. Staniford-Chen, S. and Heberlein,
L.T. "Holding intruders accountable on the Internet," In
Proceedings of the 1995 IEEE Symposium on Security and Privacy (Oakland, CA,
1995), 34-49. 13. L.T.
Heberlein, K. Levitt and
B. Mukherjee. "Internetwork
Security Monitor: An Intrusion-Detection System for Large-Scale
Networks," in Proc. 15th National Computer Security
Conference pages 262-271, Oct. 1992. 14.
H. T. Jung et al. "Caller
identification System in the Internet Environment," In Proc. 4th
Usenix Security Symposium, 1993. 15.
Bruce Schneier
and John Kelsey, ¡§Secure Audit Logs to Support Computer Forensics,¡¨ ACM
Trans. on Information and System Security, Vol. 2, No. 2, May 1999, Pages
159-176. 16. Yin Zhang, and
Vern Paxson, ¡§Detecting Backdoors,¡¨ 9th Usenix Security Symposium 17. Yin Zhang, and
Vern Paxson, ¡§Detecting Stepping Stones,¡¨. 9th Usenix Security
Symposium |