Show simple item record

dc.contributor.advisorΚάτσικας, Σωκράτης
dc.contributor.authorLiakopoulos, Nikolaos
dc.contributor.authorΛιακόπουλος, Νικόλαος
dc.date.accessioned2018-01-18T12:14:35Z
dc.date.available2018-01-18T12:14:35Z
dc.date.issued2017
dc.identifier.urihttps://dione.lib.unipi.gr/xmlui/handle/unipi/10650
dc.format.extent84el
dc.language.isoenel
dc.publisherΠανεπιστήμιο Πειραιώςel
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Διεθνές*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.titleMalware analysis & C2 covert channelsel
dc.typeMaster Thesisel
dc.contributor.departmentΣχολή Τεχνολογιών Πληροφορικής και Επικοινωνιών. Τμήμα Ψηφιακών Συστημάτωνel
dc.description.abstractENIn the internal network of a large organization, there may be a large number of security measures or products in place, such as antivirus, Intrusion Prevention/Detection Systems (IPDS), Firewalls, security patch management, etc., and there is still some malware, mostly APT threats, that goes undetected. One of the activities that malware will conduct is “phone home”, to either fetch updates and instructions from the remote Command and Control (C&C) servers, or send back stolen information. It is challenging, but also may be proven fruitful to proactively detect these malware phone-home activities. But before that, an analyst must be aware of the most common techniques which were used in order for attackers to exfiltrate data through these channels. The first part of this thesis covers tools and techniques for malware analysis and reverse engineering, as well as the setup and documentation of a basic lab environment. The second part focuses on analyzing and documenting core techniques and attributes of known Command and Control channels for Malware communication (C2 channels) and examines implementations of such covert channels through common computer network protocols. In the final part, we propose and develop a covert data exfiltration method based on established techniques.el
dc.contributor.masterΑσφάλεια Ψηφιακών Συστημάτωνel
dc.subject.keywordMalwareel
dc.subject.keywordMalicious softwareel
dc.subject.keywordStatic analysisel
dc.subject.keywordDynamic analysisel
dc.subject.keywordCovertel


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές
Except where otherwise noted, this item's license is described as
Attribution-NonCommercial-NoDerivatives 4.0 Διεθνές

Βιβλιοθήκη Πανεπιστημίου Πειραιώς
Contact Us
Send Feedback
Created by ELiDOC
Η δημιουργία κι ο εμπλουτισμός του Ιδρυματικού Αποθετηρίου "Διώνη", έγιναν στο πλαίσιο του Έργου «Υπηρεσία Ιδρυματικού Αποθετηρίου και Ψηφιακής Βιβλιοθήκης» της πράξης «Ψηφιακές υπηρεσίες ανοιχτής πρόσβασης της βιβλιοθήκης του Πανεπιστημίου Πειραιώς»