开发者

How to detect malicious packets? [closed]

开发者 https://www.devze.com 2023-02-14 20:51 出处:网络
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical andcannot be reasonably answered in its current form. For help clari
It's difficult to tell what is being asked here. This question is ambiguous, vague, incomplete, overly broad, or rhetorical and cannot be reasonably answered in its current form. For help clarifying this question so that it can be reopened, visit the help center. Closed 11 years ago.

I have implemented a packet analyzer in Java. Now I want to detect whether the packets captured are malicious or not. For example, how do I detect a DOS attack using Java code? What is the legal size of a TCP packet? If the size is above the le开发者_如何学Cgal size, can the packet be considered malicious?


Test for the evil bit!

Seriously, there's no shortcut unfortunately. It's a bit like asking how you detect a terrorist at an airport checkpoint.

You need to read the RFCs, research the sorts of attacks that are possible, and decide which of these you want to try and detect; given this information, working out the mechanics of how to detect any particular kind of attack should be straightforward, and if you do run into problems you will be able to ask a more specific question here.

Some links to get you started:

  • IP datagram format
  • Snort is an intrusion detection system - i.e. a piece of software that does what you are attempting: captures traffic and checks it against a large list of known malicious patterns. It is open source: you can look at the source to see how it does things, and look at their database to see what sorts of things it checks for.

As with virus detection, building a sufficiently large database of patterns of malicious activity is the bulk of the difficulty / expense in such a project and is what will make the difference between your tool being useful and not. To produce a tool useful for any purpose other than personal research / educating yourself on how such tools work will likely take many man-years. Your best way forward would likely be to make use of an existing open database such as Snort's, or simply contribute your time to their effort.


You secretly have two questions in one:

  1. What sequence of events would be categorized as malicious
  2. How do I detect such a sequence of events.

(2) is fairly straightforward given (1), but answering (1) is difficult without years of experience (or borrowing from other's experience), as Christian Sciberras was alluding to.

0

精彩评论

暂无评论...
验证码 换一张
取 消