Font Size: a A A

Research And Implementation Of Controllable Spread Of Mobile Agent

Posted on:2008-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:J J ZhouFull Text:PDF
GTID:2178360215983332Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the application of the internet and scrambling for information superiority, the problem of computer network security already becomes a world-wide research hotspot. The research about Computer Network Attack(CNA),Computer Network Defense(CND),Computer Network Exploit(CNE) has a great deal important theoretic meaning and value to computer network and information security,information operation. Agent diffusion is an important component of Computer Network Exploit (CNE) research. This paper points out, the agent based on the item background's demand today, is mainly all kinds of worms and the bot program. The worm program is completely autonomy diffusion after released and its action is out of control; Bot program has a very strong controlled ability, but its diffusion ability is a little weak. According the above condition, this paper points out the controlled diffusion is the key to agent research, present the scheme of controlled diffusion, based on which design and achieve the system, and finish the controlled executive of agent diffusion.In the dissertation the main work of this paper can be generalized as follow:1. Taking the worm and bot as example, we analyze the current research conditions of agent, and points out its problems.At present, worm can run without the control of the user, and once released, seize the master of the computer which has vulnerability in network, Bot program only has the ability of simple diffusion, automatically search and expand new bot computer. But the controlled ability of the bot is strong, and can efficiently receive and execute the controlled demand sent by demander.2. we analyze the example of worm and bot diffusion, expound the agent diffusion problem, points out its controlled ability is the key to research, and analyze the main problem which the agent diffusion should deal with.The controlled diffusion of agent must utilize the vulnerability of the aim to achieve full controlled ability, then with which send agent code and interrelated data, and automatically loaded and execute agent copy in the arm to activate its three phase. Usually agent only utilize one or several limited vulnerability to achieve purview; transfer agent code and interrelated data, and the way that the agent activate its program is too onefold. In the dissertation, we expand the technology which every phrase will deal with during the process of the agent diffusion, bring up with the agent diffusion system idea in which the diffusion instruction can be parsed to execute and diffusion method.3. We analyze and discuss the core technology of agent controlled diffusion. Firstly, we analyze and design the core technology which is coupled by the diffusion. Secondly, we choose the perfect technology scheme from the different phrase of the diffusion. On the basis of which, the dissertation induce the analysis of the core technology including the vulnerability exploitation,reverse connection and far tread insertion. Finally we present the arithmetic description of instruction parse.4. Based on the core technology, we take the Windows2000/XP based on Inter x86 CPU as the example, and present an agent controlled diffusion schema. What's more, we design and implement the system with the software engineering idea.5.We present the test aim, test environment and test outline, based on which, we validate the design aim of the exploitation, data and code transferring, and program activation during the agent controlled diffusion. Besides, we have a logic prove to the feasibility. The testing results indicate that the problems we bring up with and the thought to resolve the problem are effective in research, feasible in design and the implement of the schema is right.Finally, we come to the conclusion of our research in the dissertation, and points out the research content that we have to do in the future.
Keywords/Search Tags:Mobile agent, Control, Diffusion, Instruction parse, Exploit
PDF Full Text Request
Related items