全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2015 

基于模拟攻击的内核提权漏洞自动利用系统
Automatically exploiting system of kernel privilege escalation vulnerabilities based on imitating attack

DOI: 10.7523/j.issn.2095-6134.2015.03.014

Keywords: Linux内核,提权漏洞,漏洞利用,系统安全
Linux kernel
,privilege escalation vulnerabilities,exploits,system security

Full-Text   Cite this paper   Add to My Lib

Abstract:

摘要 针对Linux下的内核级提权漏洞,基于模拟攻击的漏洞检测思想,设计并开发漏洞自动利用系统KernelPET,揭示典型提权漏洞的利用过程,从而为漏洞防御提供支持.KernelPET系统与主流漏洞库exploit-db、securityfocus等衔接,模拟攻击测试近百个提权漏洞,挑选30个经典的Linux内核提权漏洞载入KernelPET漏洞代码库,并基于不同内核、不同发行版的Linux平台测试.实验结果表明,KernelPET在多类发行版Linux系统下具有较好的效果.

References

[1]  Chen H G,Mao Y D,Wang X,et al.Linux kernel vulnerabilities:State-of-the-art defenses and open problems[C].Proceedings of the Second Asia-Pacific Workshop on Systems,ACM,2011.
[2]  HD M,Spoon M,James L,et al.Metasploit[CP/OL].2014[2014-07-23].http://www.metasploit.com.
[3]  Gordon L.Nmap[CP/OL].2014[2014-07-23]. http://nmap.org.
[4]  Renaud D,Ron G.Nessus[CP/OL].2014[2014-07-23].http://www.tenable.com/products/nessus.
[5]  Provos,Markus F,Peter H,et al.Preventing privilege escalation[C].Proceedings of the 12th USENIX Security Symposium,2003.
[6]  中国信息安全测评中心.中国信息安全国家漏洞库[DB/OL].2014[2014-07-23].http://www.cnnvd.org.cn.
[7]  National Institute of Standards and Technology.American national vulnerability database[DB/OL].2014[2014-07-23].http://web.nvd.nist.gov.
[8]  Treaster M,Koenig G A,Meng X,et al.Detection of privilege escalation for linux cluster security[C].Proceedings of the 6th LCI International Conference on Linux Clusters.2005.
[9]  Offensive Security Team.Exploit database[DB/OL]. 2014[2014-07-23]2014.http://www.exploit-db.com.
[10]  Freebuf Team.Freebuf安全社区[EB/OL].2014[2014-07-23].http://www.freebuf.com.
[11]  Cobb C,Cobb S,Kabay M,et al.Penetrating computer systems and networks[M].Computer Security Handbook,2012.</p>
[12]  <p> 刘奇旭,张玉清,宫亚峰,等.安全漏洞标识与描述规范的研究[J].信息网络安全,2011,7:4-6.
[13]  Nimbalkar R,Patel P,Meshram B.Advanced linux security[J].Editorial Board,2013,2(3):7-12.
[14]  O'Gorman J,Kearns D,Aharoni M.Metasploit:The Penetration Tester's Guide[M].San Francisco:No Starch Press,2011.
[15]  国家计算机网络入侵防范中心.国家安全漏洞库[DB/OL].2014[2014-07-23].http://www.nipc.org.cn/.
[16]  绿盟公司.绿盟漏洞数据库[DB/OL].2014[2014-07-23].http://www.nsfocus.net/vulndb.
[17]  国家计算机网络应急技术处理协调中心.中国国家信息安全漏洞共享平台[DB/OL].2014[2014-07-23].http://www.cnvd.org.cn.
[18]  绿盟公司.绿盟漏洞威胁态势报告[R],北京:绿盟科技,2013[2014-07-23].http://www.nsfocus.com.cn/4_research/4_6.html.
[19]  Security-Database Company.Security vulnerability database[DB/OL].2014[2014-07-23].http://www.security-database.com.
[20]  Symantec Company.Securityfocus vulnerability database[DB/OL].2014[2014-07-23].http://www.securityfocus.com/bid.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133