µ±Ç°Î»ÖãºÊ×Ò³ > 360ÌìÇæÖն˰²È«¹ÜÀíϵͳ¼¼Êõ°×ƤÊé
360ÌìÇæ Öն˰²È«¹ÜÀíϵͳ
¼¼Êõ°×ƤÊé
±±¾©Ææ»¢¿Æ¼¼ÓÐÏÞ¹«Ë¾
2013Äê8ÔÂ
Ŀ¼
Ò»¡¢
±³¾°¸ÅÊö
4
1¡¢ ±³¾° 4
1.1¡¢ ÖÕ¶ËľÂí¡¢²¡¶¾ÎÊÌâÑÏÖØ
1.2¡¢ 0day©¶´ºÍÌØÂíµ¼ÖµÄAPTÎÊÌâÑÏÖØ 1.3¡¢ Öն˽ÓÈëÎÊÌâÑÏÖØ 1.4¡¢ ÖÕ¶ËÎ¥¹æÈí¼þ°²×°ÎÊÌâÑÏÖØ 1.5¡¢ ÖÕ¶Ë©¶´ÎÊÌâÑÏÖØ 1.6¡¢ Öն˰²È«×´¿öÐèҪͳһ¹Ü¿Ø 2¡¢ ²úÆ·¶¨Î» 6 ¶þ¡¢
²úÆ··½°¸¹¦ÄܽéÉÜ 7
1¡¢ Éè¼ÆÀíÄî 7
1.1¡¢ ÊÕ¼¯Á˽â 1.2¡¢ Á¢Ìå·À»¤ 1.3¡¢ ¼¯ÖÐ¹Ü¿Ø 2¡¢ ÏµÍ³ÍØÆËͼ 7 3¡¢ ϵͳ¹¹¼ÜÃèÊö 8
3.1. ÌìÇæ¿ØÖÆÖÐÐÄ 3.2. ÌìÇæÖÕ¶Ë 4¡¢ ϵͳÖ÷Òª¹¦ÄܽéÉÜ
10
4.1. ·þÎñ¶Ë¹¦ÄÜ 4.2. Öն˹¦ÄÜ
Èý¡¢
²úÆ··½°¸¼¼Êõ½éÉÜ 14
1¡¢ Ïà¹Ø¼¼Êõ 14 2¡¢ ¼¼ÊõÖ¸±ê 14 ËÄ¡¢
ʵʩÔËά·½Ê½ËµÃ÷ 14
1¡¢ ʵʩÔÔò 14 2¡¢ ʵʩÁ÷³Ì 14
2.1. °²×°¿ØÖÆÖÐÐÄ
4 4 5 5 5 6
7 7 7
9 9 11 12 14
2.2. С·¶Î§²¿ÊðÖÕ¶Ë 2.3. À©´óÖÕ¶Ë·¶Î§ 2.4. È«ÆóÒµÍÆ¹ã
14 15 15
Ò»¡¢ ±³¾°¸ÅÊö
1¡¢ ±³¾°
Ëæ×Å×î½ü¼¸Äê¸÷ÆóÊÂÒµµ¥Î»ÍøÂçÓ¦ÓõĿìËÙ·¢Õ¹ºÍ¾ßÓкڿ͹¥»÷ÌØÕ÷µÄÐÂÀàÐͲ¡¶¾µÄ´óÁ¿³öÏÖ£¬ÔÓеķÀ¶¾´ëÊ©ÒѾ²»ÄܺܺõÄÂú×ãÍøÂçϵͳ°²È«µÄÐèÒª£¬Í»³ö±íÏÖÔÚÈçϼ¸¸ö·½Ã棺
1.1¡¢ ÖÕ¶ËľÂí¡¢²¡¶¾ÎÊÌâÑÏÖØ
ĿǰºÜ¶àÆóÊÂÒµµ¥Î»È±·¦±ØÒªµÄÆóÒµ¼¶°²È«Èí¼þ£¬µ¼ÖÂÖÕ¶ËľÂí¡¢²¡¶¾·ºÀÄ£¬¶øÇÒÓÉÓÚÖÕ¶Ë´¦ÓÚÆóÒµ¾ÖÓòÍøÄÚ£¬Ôì³É½»²æ¸ÐȾÏÖÏóÑÏÖØ£¬ºÜÄѳ¹µ×Çå³ýijЩ¸ÐȾÐÔ½ÏÇ¿µÄ²¡¶¾¡£
ÕâÀಡ¶¾¡¢Ä¾Âí»áµ¼ÖÂÖÕ¶ËÔËÐÐЧÂʽµµÍ£¬¶ÔÎļþ½øÐÐÆÆ»µ£¬»òÕß»á°ÑһЩÃô¸ÐÐÅϢй¶³öÈ¥¡£
1.2¡¢ 0day©¶´ºÍÌØÂíµ¼ÖµÄAPTÎÊÌâÑÏÖØ
APT£¨Advanced Persistent Threat£©¹¥»÷ÊÇÒ»ÀàÌØ¶¨µÄ¹¥»÷£¬ÎªÁË»ñȡij
¸ö×éÖ¯ÉõÖÁÊǹú¼ÒµÄÖØÒªÐÅÏ¢£¬ÓÐÕë¶ÔÐԵĽøÐеÄһϵÁй¥»÷ÐÐΪµÄÕû¸ö¹ý³Ì¡£APT¹¥»÷ÀûÓÃÁ˶àÖÖ¹¥»÷ÊֶΣ¬°üÀ¨¸÷ÖÖ×îÏȽøµÄÊֶκÍÉç»á¹¤³Ìѧ·½·¨£¬Ò»²½Ò»²½µÄ»ñÈ¡½øÈë×éÖ¯ÄÚ²¿µÄȨÏÞ¡£APTÍùÍùÀûÓÃ×éÖ¯ÄÚ²¿µÄÈËÔ±×÷Ϊ¹¥»÷Ìø°å¡£ÓÐʱºò£¬¹¥»÷Õß»áÕë¶Ô±»¹¥»÷¶ÔÏó±àдרÃŵĹ¥»÷³ÌÐò£¬¶ø·ÇʹÓÃһЩͨÓõĹ¥»÷´úÂë¡£
´ËÍ⣬APT¹¥»÷¾ßÓгÖÐøÐÔ£¬ÉõÖÁ³¤´ïÊýÄê¡£ÕâÖÖ³ÖÐøÌåÏÖÔÚ¹¥»÷Õß²»¶Ï³¢ÊÔ¸÷ÖÖ¹¥»÷ÊֶΣ¬ÒÔ¼°ÔÚÉøÍ¸µ½ÍøÂçÄÚ²¿ºó³¤ÆÚÕÝ·ü£¬²»¶ÏÊÕ¼¯¸÷ÖÖÐÅÏ¢£¬Ö±µ½ÊÕ¼¯µ½ÖØÒªÇ鱨¡£
¸ü¼ÓΣÏÕµÄÊÇ£¬ÕâЩÐÂÐ͵Ĺ¥»÷ºÍÍþвÖ÷Òª¾ÍÕë¶Ô¹ú¼ÒÖØÒªµÄ»ù´¡ÉèÊ©ºÍµ¥Î»½øÐУ¬°üÀ¨ÄÜÔ´¡¢µçÁ¦¡¢½ðÈÚ¡¢¹ú·ÀµÈ¹ØÏµµ½¹ú¼ÆÃñÉú£¬»òÕßÊǹú¼ÒºËÐÄÀûÒæ
¹²·ÖÏí92ƪÏà¹ØÎĵµ