999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Analysis and thought on quantum insert technology

2017-09-08 09:14:53ZHANGXueboWANGSiZOUHongxia
網絡與信息安全學報 2017年8期

ZHANG Xue-bo, WANG Si, ZOU Hong-xia

(Department of Information Equipment Aerospace Engineering University of PLA, Beijing 101416, China)

Analysis and thought on quantum insert technology

ZHANG Xue-bo, WANG Si, ZOU Hong-xia

(Department of Information Equipment Aerospace Engineering University of PLA, Beijing 101416, China)

Quantum insert (QI) is a technology that makes redirection attacks by injecting malicious content into certain sessions. A brief introduction of American “Quantum Insert” project was given and the connotation of this technology was discussed. It then looked into the application that quantum insert was put to in the Internet “Great Cannon” event. An open source QI tool made available by Fox IT, an IT security company, was then analyzed. An experimental verification environment was built using this tool and a verification was made. Finally, a thought was given on how to put QI to use in building network defense.

quantum insert, great cannon, FoxAcid, Fox IT

1 Introduction

“Quantum insert” project is part of and plays an instrumental role in “Quantum Plan”, a top-secret scheme under American National Security Agency (NSA)[1]. “Quantum insert” project has by now developed a set of tools. Table 1 gives some of these tools and their application scenarios, including attack and defense scenarios.

QI is a technology that makes redirection attacks by injecting malicious content into certain sessions. QI is a kind of off-path attack, since it does not control a network node completely as in the case of man-in-the-middle attack. Instead, the attacker accesses periodically the communication channels to read certain communications or insert additional messages without altering or deleting the user’s messages, that is not to insert into the messages but to insert additional messages in the session[2].

Table 1 Quantum insert tools and their application scenarios

The packets passing over the network nodes are captured by mirroring, without affecting the normal transmission of packets. Through the reconstruction of the mirror data packet, the data packet is restored to its original state. Then, according the informations of the four tuple and packet header, the packets are forged and sent to form a preemptive response to the client request and discard the normalresponse packets after the arrival.

The process of a QI attack consists of monitoring TCP sessions and inserting spoofed data packets. When the spoofed packet reaches the target earlier than the original packet, we say there happens a successive “insert”. To make a data packet spoofing a success, the attacker needs to listen in on the network and acquire some session information: source IP & target IP, source port & target port, serial number and ACK number, all of them being retrievable from the TCP packets that contain http requests. In addition to this, the attacker’s spoofed data packets have to reach the target before the real network server responds, taking advantages of this speed difference and competitive edge to masquerade as the real network server. And the result is the website accessed by the user is redirected to the target server. The user may be unaware of being deceived if the false website, to which the user is redirected, masquerades well enough. If the user is redirected to, say, the FoxAcid server of the American Forces, he is utterly at the mercy of the forces. Fig. 1 presents the QI attack process.

2 Analysis of the “Great Cannon” event

QI technology attracted extensive attention after China’s “Great Cannon” event. GitHub, an America-based management platform of open source codes, suffered on March 26, 2015 the most massive denial of service (DoS) attack in its history. Some overseas users accessing a Baidu service script attacked instead two mirror image pages of GreatFire and the New York Times. This DDoS attack against GitHub was dubbed by international media as China’s “Great Cannon” event. Baidu, however, ruled out the possibility of security defect intrinsic to its product or the likelihood of hacker attacks.

This event was created by the attacker who, using QI technology, hijacked the sessions of overseas users when they attempted to access Baidu. It is Baidu’s statistics js code that was altered[3,4]. Fig. 2 shows the altered code, whose function is to shut the cache and access every 2 seconds two of GitHub’s websites. The faked js file received by the user’s browser is used to make DDoS attack.

Fig. 1 The QI attack process

Fig. 2 Hijacked statistics js code of Baidu

This QI attack process is illustrated in Fig. 3.

1) Http analysis: A data packet analysis tool, like Wireshark, was utilized to analyze the http data stream in normal Baidu website accessing.

2) Point of penetration of positioned attack: The point after which data packets are to be faked, having regard to the designated js file. For instance, to which data packet shall a response be faked in order to substitute the m. js file.

3) Fake data packet: Fake the altered js file as data streams, and the data packet format shall be able to deceive the client side.

4) Stealthy substitution: Send the spoofed data packets to the client side before Baidu website does so.

3 Experimental analysis of QI technology

3.1 An open source quantum insert tool

Fig. 3 The QI attack process

Fox IT, an IT security company, develops a quantum insert tool and has released its source code on a website of an open source code: https://github. com/fox-it/quantuminsert. This open source quantum insert tool comes with a monitor (monitor. py), an attacker (shooter. py), and a test data packet. The monitor is a Python script, able to acquire the serialnumber (needed for Tcpdump and Tshark output), ACK number, TCP port, and IP address, and it permits to choose HTTP cookie value. The attack script is also written in Python, and the spoofed data packet is made and sent using Scapy, as shown in Fig.4[5].

3.2 Designing a QI experiment

Using this open source QI tool and its test data packet, the authors constructed a QI experimental environment, as shown in Fig. 5, to investigate this technology and assess its effect. This environment consists of 2 nodal routers (C and D), 1 monitoring server, 1 insert server, 1 user host, and 1 target website server B. QI was implemented on the nodal routers[6].

The experimental QI process is as follows.

1) User host A accesses the target website server B via router nodes C and D.

2) The monitoring server sniffs the whole of the data packets that pass router node C.

3) The monitoring server screens out specific target addresses and access requests.

4) The monitoring server communicates to the insert server the access request data acquired in 3).

Fig. 5 A designed QI experiment

5) The insert server sends, via the router node C, faked data response to the user’s host A, and thisresponse reaches the user’s host A earlier than the response of the real target website server B, hence achieving QI.

3.3 Analysis of the quantum insert experiment results

This experiment was performed in 2 groups to achieve QI, based on UDP and TCP respectively.

Experiment 1 UDP-based data packet insert. UDP does not need check, so to achieve QI we need only to run in the monitoring server a monitor program to listen in on the session information passing router node C, and let the insert server to alter the data sniffed and send via node C the spoofed data to host A. The spoofed and sent data is given in Fig. 6.

Fig. 6 Sending a spoofed data packet

Fig. 7 Receiving a spoofed data packet

Experiment 2 TCP-based data packet insert. TCP requires data check. For this reason, an additional check step is involved in TCP-based data packet insert. In the TCP header check computation, we need to clear the checksum field. Once the new checksum is found, it must be inserted into the field before sending the spoofed data packet; otherwise this spoofed packet will be discarded by host A. Fig. 8 shows the data packet received on host A, viewed using Wireshark.

Apparently, the user’s host A receives, one after the other, two data packets (#3 and #5) coming from the source address and the target address respectively. The former, 60 in length, is the spoofed data packet sent by the insert server and contains TEST data; the latter, 54 in length, is the response data packet sent by the target website server, but is discarded by host A, and therefore QI is achieved.

4 A thought on QI’s role in network defense building

4.1 An analysis of US forces “Turbine” plan

Fig. 8 Insert viewed on the user’s host A

“Turbine” plan automatically inserts spyware, including malware and data collection ware, into target computers. “Turbine” plan relies primarily on QI tools, and also needs the coordination of“Chaos” and “FoxAcid” systems. First of all,“Chaos” system, by use of a series of “selectors”, monitors and analyzes users’ behavior, which helpsfind worthy attack targets. Then, it informs “Turbine” system to hijack one target user’s session through QI technology, that is inserting a faked response command before the real one arrives and luring the target to access a “FoxAcid” server. The user then accesses the “FoxAcid” server unknowingly, downloads attack ware, and implants Trojan ware. The ultimate goal of putting the target under control is achieved. The whole of the attack process is shown in Figure 6[7].

Fig. 9 The attack process of “Turbine” plan

4.2 An analysis of the QI system

Following the idea of NSA’s “Turbine” plan, a powerful network attack and defense weapon of huge deterrence can be created if QI technology is installed in the state trunk lines or the country border firewall.

1) QI technology is to play the following roles in building up network defense.

2) DDoS attack: Plants malicious code into a large number of user sessions making them to send countless data requests to the target server, thus mounting DDoS attack against the target server.

3) Pilferage and control of user data: Implants in the session returning to the user a redirection to the malicious website. This operation does not need webshell authority. When the user accesses this malicious website, this website scans the user’s system for any vulnerabilities and, by taking advantage of the vulnerabilities of the user’s system or its third-party software, infiltrates into and controls the user’s host.

4)DNS hijack: Hijacks the user’s access to the DNS server so as to return a false IP address abducting users to access a faked website.

5)Gateway hijacking: Sends, before the gateway makes any response, a data packet to the source address claiming that the destination is not reachable, so making the source address host send request data packets repeatedly; and the result is that a large amount of the target host resources are wasted.

Network defense: Redirects an attacker to another address so that the target network or server is put under protection.

4.3 A thought on the design of a QI system

From the design perspective, a QI system involves three layers, as illustrated in Fig. 7. The bottom layer, called data operation layer, is for data acquisition and packet operation and also for providing the upper level with restored data and shielding such operation details as data acquisition, data packet restoration and reconstruction. The second is technical implementation layer. It is designed to provide functional modules to be used in the QI attack and includes data monitoring, insert, URL redirection, Trojan ware implanting, TCP half connection. The top layer is for functional application, and it is intended for mounting all types of network attacks: DDoS attack, user information pilferage and control, DNS hijack, gateway hijack, and network protection, etc[8].

5 Conclusion

President Xi Jinping advocates for cyberspace sovereignty and safeguarding our network security. By taking advantage of the technical benefits specific to QI, a powerful network attack and defense weapon of great deterrence can be created if this technology is applied to China’s border route to the international Internet. This may provide an effective way to boost our cyberspace sovereignty and network security. Meanwhile, it is equally important for us to research into QI detection and protectiontechnologies so that if our network suffering Cyber attacks, we can exploit QI technology to find and track it faster. We can use HTTPS and CDN acceleration to defense QI attacks.

Fig. 10 A hierarchical breakdown of the QI system Concluding Remarks

[1] JIN Y. Elaboration on quantum: NSA’s most power internet attack tool[EB/OL].(2014-3-17). http://tech.qq.com/a/20140317/003378.htm.

[2] QING Y, CHEN Q. Emerging cyberspace security technologies [M].CETGC 30th Institute, 2013.12.

[3] Russell Brandom. GitHub was hit with massive denial-of-service attack from China[EB/OL]. http://www.theverge. com/ 2015/3/27/ 8299555/github-china-ddos-censorship-great-firewall.

[4] BILL M, NICHOLAS W, et al. China’s great Cannon[EB/OL]. https://citizenlab.org/2015/04/chinas-great-cannon/.

[5] WANG J. Remote network based data packet monitoring and reconstruction technology[D]. Dalian: Dalian Jiaotong University, 2010.

[6] CAI J J. HTTP Response splitting attack analysis and its detection method design[D]. Beijing: Beijing University of Posts and Tele-communications, 2012.

[7] QING Y, ZHOU W. Discovery: America’s network monitoring project [M]. CETGC 30th Institute, 2014.

[8] LI N. IPv6-based intrusion detection system research and imple-mentation[M]. Petroleum Institute of Daqing, 2006.

About the authors:

ZHANG Xuebo(1977-), born in Jilin, Doctor’s degree. He is a lecturer in department of information equipment aerospace engineering university of PLA. His main research interests include network security strategy, network attack and defense technology.

WANG Si(1985-), born in Jiangxi. He is a master in aerospace engineering university of PLA. His main research interest include network security.

ZOU Hongxia(1968-), born in Liaoning. She is an associate professor in department of information equipment Aerospace Engineering University of PLA. Her main research interest include network and information security.

10.11959/j.issn.2096-109x.2017.00185

ed data

on the user’s host is as shown in Fig. 7.

Received Date: 2017-06-06, Revised Date: 2017-07-29. Corresponding Author: ZHANG Xuebo,178140615@qq.com

Basic Research Project of Information Security Laboratory for National Defense Research and Test

主站蜘蛛池模板: 国模私拍一区二区三区| 伊人久久青草青青综合| 亚洲bt欧美bt精品| 欧美区国产区| 青青青亚洲精品国产| 国产在线欧美| 亚洲床戏一区| 亚洲无码四虎黄色网站| 亚洲欧美综合在线观看| 中文字幕不卡免费高清视频| 国产黑人在线| 日本午夜影院| 亚洲VA中文字幕| 暴力调教一区二区三区| 天天色天天综合网| 亚洲精品片911| 亚洲成av人无码综合在线观看 | 欧美精品成人一区二区视频一| 一区二区三区四区日韩| 国产幂在线无码精品| 国产一级小视频| 狠狠躁天天躁夜夜躁婷婷| 国产精品无码制服丝袜| 欧美一级高清片欧美国产欧美| 中文字幕无码中文字幕有码在线| 中国一级特黄视频| 国产成年女人特黄特色毛片免| 久久精品人人做人人爽97| 亚洲精品午夜天堂网页| 亚洲啪啪网| 午夜高清国产拍精品| 日本高清免费一本在线观看| 欧美在线国产| 国产午夜无码片在线观看网站 | 日韩高清一区 | 女人av社区男人的天堂| 91网址在线播放| 韩国福利一区| 五月婷婷亚洲综合| 亚洲欧美激情小说另类| 精品撒尿视频一区二区三区| 思思热精品在线8| 国产精品任我爽爆在线播放6080| 欧美日在线观看| 成年av福利永久免费观看| 免费观看欧美性一级| 99视频国产精品| 91麻豆精品视频| 免费观看男人免费桶女人视频| 国产高清自拍视频| 国产真实自在自线免费精品| 91精品国产麻豆国产自产在线| 一级毛片不卡片免费观看| 午夜a视频| 无码国产伊人| 又大又硬又爽免费视频| 欧美一级大片在线观看| 久久美女精品| 日韩美一区二区| 久久久久亚洲AV成人人电影软件 | 欧美综合成人| 99视频精品全国免费品| 国产av色站网站| 国产第四页| 国产91在线免费视频| 黄片一区二区三区| 亚洲第一成网站| 中文字幕日韩欧美| 亚洲人成网站日本片| 久热这里只有精品6| 亚洲激情99| 天堂av综合网| 久久精品欧美一区二区| 一级毛片基地| a级毛片毛片免费观看久潮| 少妇人妻无码首页| 欧美日韩精品一区二区在线线| 国产成人夜色91| 国产交换配偶在线视频| 久久久久久久97| 亚洲国语自产一区第二页| 久热精品免费|