Show simple item record

dc.contributor.advisorΝταντογιάν, Χριστόφορος
dc.contributor.authorΚαπίρης, Σταμάτης
dc.contributor.authorKapiris, Stamatis
dc.date.accessioned2018-01-19T09:31:54Z
dc.date.available2018-01-19T09:31:54Z
dc.date.issued2017-06
dc.identifier.urihttp://dione.lib.unipi.gr/xmlui/handle/unipi/10670
dc.format.extent94el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleExploit Kit traffic analysisel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENExploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have started to adopt multiple security solutions to guard their perimeter against them. An exploit kit is actually a type of malicious toolkit that is used to identify and exploit security holes found in web browser plugins installed on victim’s computer, for the purpose of facilitating the real aim of spreading and infecting the computer with a type of malware. Exploit kit authors have been proven quite skilled programmers of crimeware which embodies sophisticated code and characteristics considered as challenging in terms of analysis and detection, for both security controls and analysts. In this thesis, we will try to examine the exploit kit phenomenon and cover all perspectives. First of all, we will explain the motivating factor of studying this subject and refer to cybersecurity researchers’ previous work regarding exploit kit analysis. We will also refer to cyber security incidents of the past having as main actor an exploit kit and describe their infrastructure and business model they usually follow for profiting from their underground activity. To familiarize the reader with the exploit kits, we will discuss the ways of propagating themselves and describe and analyze their main characteristics that can be categorized as attack characteristics and self-defense characteristics. We have also covered the procedure of analyzing network traffic captures that contain traffic produced by exploit kits, so as to give a walkthrough to the researchers who will be interested in performing a basic malware traffic analysis. Finally, we designed a simple command line script that takes as input a packet capture file that contains network traffic captured during live infection by exploit kit, parses the packets according to the exploit kit theory that is described in this thesis, to indicate in turn, the potential attack path the actor followed to compromise the victim. Our code is based on the results of our research and our observations by analyzing many malware samples. It would be possibly useful for a researcher who wants to a quickly identify a starting point to begin his analysis of samples containing exploit kit traffic.el
dc.contributor.masterΑσφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordMalware analysisel
dc.subject.keywordSecurityel
dc.subject.keywordTrafic analysisel
dc.subject.keywordPLAP networkel
dc.subject.keywordExploit Kitel


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Except where otherwise noted, this item's license is described as
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Contact Us
Send Feedback
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»