Font Size: a A A

P2p Worm Design Based On Buffer Overflow

Posted on:2013-04-06Degree:MasterType:Thesis
Country:ChinaCandidate:J W TianFull Text:PDF
GTID:2248330374986274Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In this context, P2P worms can spread fast because of the features of its networktopology. However, this will generate a lot of security problems and will threat thenetwork status a lot. How to deal with threats of P2P worms has become an importantissue at present. Buffer overflow attack is one of the most popular means of attack,it canbe combined with worm design through analyzing its principle,then we can design anactive-type worm which has low human intervention degree.In order to achieveactive-type worm attack,it mainly achieve automatic transferring&manual infectionmode and reduce the artificial control and passive waiting for the opportunity In peer topeer network space.In order to solve above-mentioned problems, this paper designed a P2P wormbased on the overflow of the buffer. We combined the socket communicationtechnology and the principle of buffer overflow and successfully create this worm.Theworm will analyze and design in transferring and infection and do further design toattack multi-system.The main contens is as follows:1.Designing a P2P worm based on the overflow of the buffer overflow. This cansimulate the intention of the attacker and understand the consciousness of ourselvesand the system vulnerability.2.Making some general processing in the shellcode part of the worm to attack avariety of Windows operating system simply.In complex network theory as a guide, this paper in-depth study of P2P networktopology and the principle of buffer overflow and shellcode technology, and P2P wormcharacteristics, then get a new worm based on buffer overflow technology invirus analytical laboratories.We achieved the variety of buffer overflow exploits on theWindows operating system, Telnet backdoor attacks, worm attack and propagation. Welook forward to make some contribution in the study of P2P worm security.
Keywords/Search Tags:Peer-to-Peer, P2P Worms, Complex Networks, Buffer Overflow, HumanIntervention Degree
PDF Full Text Request
Related items