跳到主要內容

臺灣博碩士論文加值系統

(44.210.21.70) 您好!臺灣時間:2022/08/16 18:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:劉亞翰
研究生(外文):Ya-han Liu
論文名稱(外文):A SDN-based Approach for Flow Analysis Attack
指導教授:張貴雲張貴雲引用關係
指導教授(外文):Guey-yun Cheng
學位類別:碩士
校院名稱:國立中央大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2014
畢業學年度:102
語文別:英文
論文頁數:38
中文關鍵詞:軟體定義網路位置隱私流量分析攻擊
相關次數:
  • 被引用被引用:0
  • 點閱點閱:183
  • 評分評分:
  • 下載下載:5
  • 收藏至我的研究室書目清單書目收藏:0
網路電話在現代社會變得越來越流行。隱私是一個網路電話重要的特性。 但不幸的是,大部份的點對點網路電話既不提供個人隱私也不保證一定的安全程度。在本文中我們提出了一種以K匿名為基礎的方式來防範特定攻擊者追蹤網路電話使用者的身份,並在不同的安全程度底下比較封包延遲時間以及通訊消耗。
VoIP (voice over IP) networks are becoming more and more popular in modern society. One of the most important features of a VoIP network is privacy (for VoIP users). Unfortunately, most peer-to-peer VoIP networks neither provide personalization nor guarantee a quantifiable privacy level. In this thesis, we propose a SDN-based approach to prevent flow analysis attack trying to trace user’s identity. Flow analysis attack will trace the flow which specific caller transmits, and try to find possible receiver, threat user’s privacy. We present the latency and number of packets in our method, while meeting customizable privacy guarantees.
英文摘要. . . . . . . . . . . . . . . . . . . . . . . . . . . . . i
目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
圖目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
表目錄. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
一、Introduction . . . . . . . . . . . . . . . . . . . . 1
二、Related Work . . . . . . . . . . . . . . . . . . . 7
三、Preliminary . . . . . . . . . . . . . . . . . . . . 11
3-1 Flow Analysis Attack . . . . . . . . . . . . . . . 11
3-2 System Model . . . . . . . . . . . . . . . . . . . 11
四、A SDN-Based Approach for Flow Analysis Attack 13
五、Implementation in Openflow version 1.3.3 . . . . 17
六、Simulation . . . . . . . . . . . . . . . . . . . . . 19
6-1 Mininet . . . . . . . . . . . . . . . . . . . . . . 19
6-1-1 Latency . . . . . . . . . . . . . . . . . . . . . . 19
6-1-2 Communication cost . . . . . . . . . . . . . . . 20
6-2 Estinet . . . . . . . . . . . . . . . . . . . . . . . 21
七、Conclusion . . . . . . . . . . . . . . . . . . . . . 23
[1] D. Anthony, T. Henderson, and D. Kotz. Privacy in location-aware computing environments. Pervasive Computing, IEEE, 6(4):64–72, Oct 2007.

[2] Marco Gruteser and Dirk Grunwald. Anonymous usage of locationbased services through spatial and temporal cloaking. In Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys’03, pages 31–42. ACM, 2003.
[3] T.J. Walsh and R. Kuhn. Challenges in securing voice over ip. Security Privacy, IEEE, 3(3):44–49, May 2005.

[4] M. Srivatsa, A. Iyengar, Ling Liu, and Hongbo Jiang. Privacy in voip networks: Flow analysis attacks and defense. Parallel and Distributed Systems, IEEE Transactions on, 22(4):621–633, April 2011.

[5] M. Reed D. Goldschlag and P. Syverson. Onion routing for anonymous and private internet connections. In Communications of ACM, 42(2):246–255, May 1999.

[6] S. Das, G. Parulkar, N. McKeown, P. Singh, D. Getachew, and L. Ong. Packet and circuit network convergence with openflow. In Optical Fiber Communication, collocated National Fiber Optic Engineers Conference, pages 1–3, March 2010.

[7] Natasha Gude, Teemu Koponen, Justin Pettit, Ben Pfaff, Martín Casado, Nick McKeown, and Scott Shenker. Nox: Towards an operating system for networks. SIGCOMM Comput. Commun. Rev., 38(3):105–110, July 2008.

[8] M. Srivatsa, A. Iyengar, and Ling Liu. Privacy in voip networks: A k-anonymity approach. In INFOCOM 2009, IEEE, pages 2856– 2860, April 2009.

[9] R. Braga, E. Mota, and A. Passito. Lightweight ddos flooding attack detection using nox/openflow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pages 408–415, Oct 2010.

[10] T. Kohonen. The self-organizing map. Proceedings of the IEEE, 78(9):1464–1480, Sep 1990.

[11] Yifu Feng, Rui Guo, Dongqi Wang, and Bencheng Zhang. Research on the active ddos filtering algorithm based on ip flow. In Natural Computation, 2009. ICNC ’09. Fifth International Conference on, volume 4, pages 628–632, Aug 2009.

[12] Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble. A measurement study of peer-to-peer file sharing systems. 2003.

[13] http://en.wikipedia.org/wiki/IPsec. ”ipsec”.

[14] Alexander Ageev, Refael Hassin, and Maxim Sviridenko. A 0.5- approximation algorithm for max dicut with given sizes of parts. SIAM J. Discret. Math., 14(2):246–255, February 2001.

[15] http://mininet.org/. ”mininet”.

[16] http://www.projectfloodlight.org/floodlight/. ”project floodlight”. [17] http://estinet.com/. ”estinet”.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top