DocumentCode :
2621149
Title :
Research on monitoring hiding technology in protection system
Author :
Yan, Feng ; Liu, Shufen
Author_Institution :
Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China
fYear :
2011
fDate :
26-28 Oct. 2011
Firstpage :
158
Lastpage :
161
Abstract :
With the growing number of domestic and international computer crime, remote monitoring for suspicious computers is becoming an important means to prevent computer crime and computer forensics. At the same time, remote monitoring technology plays an important role in information confrontation and cyber warfare of military. Such remote monitoring program must not be found by security defense or network monitoring software run on monitored computer, and then hide operation and communication. Hiding technology for remote monitoring is discussed in depth and implemented in this paper. The security defense soft- ware run on monitored computer captures the user access to sensitive information by intercepting system calls. In windows operating system, the interception is achieved by replacing system function entry addresses in SSDT (system service dispatch table) with own function addresses. In order not to be found by security defense program, remote monitoring must first recover function entry addresses in SSDT before it accesses to sensitive resources. This paper provides the method of SSDT recovering which recalculates and recovers the original addresses in function entry address table. The security defense software can capture network packets on the TDI(Transport Driver Interface) layer and NDIS(Network Driver Interface Specification) layer so as to monitor communication. To enable the communication between the monitored computer and the monitoring computer not to be found, it is necessary to penetrate through monitoring on TDI layer and the NDIS layer. This paper describes windows network architecture and network packet disposal process on NDIS and TDI layer, analyses the theory of security defense software capturing network communication, and puts forward the method for penetrating through the network monitoring on NDIS layer and TDI layer.
Keywords :
computer forensics; military computing; NDIS layer; TDI layer; computer crime; computer forensics; information confrontation; military cyber warfare; monitoring hiding technology; network driver interface specification; protection system; remote monitoring; security defense; system service dispatch table; transport driver interface; Monitoring; TDI client; export table; relative virtual address; relocation table;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Web Society (SWS), 2011 3rd Symposium on
Conference_Location :
Port Elizabeth
ISSN :
2158-6985
Print_ISBN :
978-1-4577-0212-9
Type :
conf
DOI :
10.1109/SWS.2011.6101289
Filename :
6101289
Link To Document :
بازگشت