首页> 外文会议>4th ACM symposium on information, computer and communications security 2009 >A Chipset Level Network Backdoor: Bypassing Host-Based Firewall IDS
【24h】

A Chipset Level Network Backdoor: Bypassing Host-Based Firewall IDS

机译:芯片组级网络后门:绕过基于主机的防火墙和IDS

获取原文
获取原文并翻译 | 示例

摘要

Chipsets refer to a set of specialized chips on a computer's motherboard or an expansion card [12]. In this paper we present a proof of concept chipset level rootkitetwork backdoor. It interacts directly with network interface card hardware based on a widely deployed Intel chipset 8255x, and we tested it successfully on two different Ethernet cards with this chipset. The network backdoor has the ability to both covertly send out packets and receive packets, without the need to disable security software installed in the compromised host in order to hide its presence. Because of its low-level position in a computer system, the backdoor is capable of bypassing virtually all commodity firewall and host-based intrusion detection software, including popular, widely deployed applications like Snort and Zone Alarm Security Suite. Such network backdoors, while complicated and hardware specific, are likely to become serious threats in high profile attacks like corporate espionage or cyber terrorist attacks.
机译:芯片组是指计算机主板或扩展卡上的一组专用芯片[12]。在本文中,我们提出了概念证明芯片组级别的rootkit /网络后门。它可以与基于广泛部署的Intel芯片组8255x的网络接口卡硬件直接交互,并且我们已经使用该芯片组在两个不同的以太网卡上成功对其进行了测试。网络后门具有隐蔽发送数据包和接收数据包的能力,而无需禁用受感染主机中安装的安全软件以隐藏其存在。由于后门在计算机系统中的地位很低,因此它能够绕过几乎所有商品防火墙和基于主机的入侵检测软件,包括受欢迎的,广泛部署的应用程序,例如Snort和Zone Alarm Security Suite。这种网络后门虽然复杂且特定于硬件,但在诸如企业间谍活动或网络恐怖袭击等高调攻击中可能会成为严重威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号