首页> 外文会议>Advances in Digital Forensics IV >IDENTIFYING AND ANALYZING WEB SERVER ATTACKS
【24h】

IDENTIFYING AND ANALYZING WEB SERVER ATTACKS

机译:识别和分析Web服务器攻击

获取原文
获取原文并翻译 | 示例

摘要

Client honeypots can be used to identify malicious web servers that attack web browsers and push malware to client machines. Merely recording network traffic is insufficient to perform comprehensive forensic analyses of such attacks. Custom tools are required to access and analyze network protocol data. Moreover, specialized methods are required to perform a behavioral analysis of an attack, which helps determine exactly what transpired on the attacked system. This paper proposes a record/replay mechanism that enables forensic investigators to extract application data from recorded network streams and allows applications to interact with this data in order to conduct behavioral analyses. Implementations for the HTTP and DNS protocols are presented and their utility in network forensic investigations is demonstrated.
机译:客户端蜜罐可用于识别攻击Web浏览器并将恶意软件推送到客户端计算机的恶意Web服务器。仅记录网络流量不足以对此类攻击进行全面的取证分析。需要自定义工具来访问和分析网络协议数据。而且,需要专门的方法来对攻击进行行为分析,这有助于准确确定在被攻击系统上发生了什么。本文提出了一种记录/重播机制,该机制使法医研究人员可以从记录的网络流中提取应用程序数据,并允许应用程序与该数据进行交互以进行行为分析。介绍了HTTP和DNS协议的实现,并演示了它们在网络取证调查中的实用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号