SIGINT10 - final10
SIGINT 2010
Konferenz für Netzbewohner, Hacker und Aktivisten
Speakers | |
---|---|
Lee |
Schedule | |
---|---|
Day | Day 2 - 2010-05-23 |
Room | Konferenzraum (MP6) |
Start time | 20:00 |
Duration | 00:45 |
Info | |
ID | 3800 |
Event type | Lecture |
Track | Hacker |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Interception and Analysis of Malicious Traffic Based on NDIS Intermediate Driver
This paper clearly describes the interception and analysis of malicious network traffic through the NDIS intermediate driver. Source codes will be provided in this paper and act as an interception-driver for network malicious traffic.
Network Driver Interface Specification (NDIS) is a specification for network driver architecture that allows transport protocols to communicate with network interface cards (NICs) or other hardware device in a device-independent manner. The NDIS library implements the NDIS boundary that exists between network layer 2 (Data Link Layer) and layer 3 (Network Layer) of the Open Systems Interconnection (OSI) model. This library is a helper library which NDIS driver clients use to format commands that communicate with NDIS driver. The NDIS driver interface’s library will act as receiving and sending between the request and response activities. There are different types of NDIS driver which allow the transport protocols to communicate with the hardware layer and implement in different configuration. Interception mechanism is implemented by the technology of NDIS Intermediate Driver where this embedded system method is recommended by the Microsoft Company as it provides maximum compatibility both with different OS’s versions and other applications and drivers. This paper clearly describes the interception and analysis of malicious network traffic through the NDIS intermediate driver. The concept of NIDS intermediate driver has been used to intercept network traffic before it reaches to higher OSI model. Auto analysis of the intercept network traffic will be conducted if the traffic consists of malicious functions. Source codes that act as an interception-driver for network packets will be described.