跳到主要內容

臺灣博碩士論文加值系統

(44.220.255.141) 您好!臺灣時間:2024/11/03 06:15
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:陳逸軒
研究生(外文):CHEN,YI-XUAN
論文名稱:建構物聯網連線偵測機制以防禦 以欺騙為基礎之中間人攻擊
論文名稱(外文):Building an IoT connection detection mechanism to defend fraud-based man-in-the-middle attacks
指導教授:洪為璽洪為璽引用關係
指導教授(外文):HUNG, WEI-HSI
口試委員:王凱王維聰郁方
口試委員(外文):WANG, KAIWANG, WEI-TSONGYU, FANG
口試日期:2019-05-14
學位類別:碩士
校院名稱:國立中正大學
系所名稱:資訊管理系研究所
學門:電算機學門
學類:電算機一般學類
論文種類:學術論文
論文出版年:2019
畢業學年度:107
語文別:中文
論文頁數:80
中文關鍵詞:物聯網中間人攻擊設計科學生命危機週期專家訪談
外文關鍵詞:Internet of ThingsMan-in-the-middle attacksDesign scienceCrisis life cycleExpert interview
相關次數:
  • 被引用被引用:1
  • 點閱點閱:168
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
在物聯網蓬勃發展的環境下,將會發生越來越多藉著物聯網或是直接攻擊物聯網
的網路攻擊,中間人攻擊等類似的攻擊手法也預估會在行動裝置或是應用程式中繼
續成長。中間人攻擊主要是第三者會作為中間人躲在交換訊息的雙方中間來竊取受
害者或設備間傳輸的資料,雖然是個古老的手法,但是中間人攻擊依然存在甚至演
變出其他的攻擊模式,因此中間人攻擊的防範是非常重要的,尤其在物聯網的應用
科技下。
本研究採用設計科學的研究方法,發展一個物聯網上用來抵禦中間人攻擊的防護
架構,此架構是利用生命危機週期和中間人攻擊的文獻當作架構雛形,再分析中間
人攻擊防範的文獻以及相關新聞個案,最後與五位專家依序進行訪談與評估以精進
防範架構來達到提煉,可以用來幫助企業依照自己被攻擊的程度,來選出適合的防
護建議,也能依照防護架構的建議來預防中間人攻擊。
結果顯示,中間人攻擊不只造成資訊的遺失或偽造,也對企業的信任產生負面影
響,更發現中間人攻擊成功的原因大多來自組織人員的資安觀念過於薄弱,特別是
邊界網路和系統交替過程中的資料,或設備疏於管理,所以需要專業技術以及組織
人員和設備的管理才能脫離中間人攻擊造成的危機,因此防範架構定義了中間人攻
擊在生命危機週期中各階段發生的情形,並且列出合適的防範方法,像是潛伏期時
確認傳輸通道正確性,後遺症期要與使用者溝通,解決期要複檢過去的改善等。
In the environment of the booming Internet of Things, there will be more and more cyber attacks through the Internet of Things or directly attacking the Internet of Things. Man-in- the-middle attacks and similar attacks are also expected to grow in mobile devices or applications. The man-in-the-middle attack is mainly that the third party acts as a middleman hiding in the middle of the exchange of messages to steal information transmitted between the victims or the devices. Although it is an ancient method, the man-in-the-middle attack still exists and even is evolving. Therefore, the prevention of man-in-the-middle attacks is very important, especially under the environment of Internet of Things.
This study adopts a design science research method to develop a protection framework for preventing man-in-the-middle attacks in the Internet of Things scenario. This framework uses the literature of crisis life cycles and man-in-the-middle attacks as the prototype of the architecture, and then analyzes the literature of man-in-the-middle attack prevention and related news cases. Finally, interviews and evaluations from five experts in order to achieve refinement to improve the architecture were carried out based on how the framework can be used to help companies to choose the appropriate protection recommendations according to the extent of their attack Their suggestions become the recommendations of the protection structure to prevent man-in-the-middle attacks.
The results show that the man-in-the-middle attack not only causes the loss or forgery of information, but also has a negative impact on the trust of the enterprise. It is also found that the reason for the successful attack of the man-in-the-middle is mostly due to the weak security concept of the organization personnel, especially the data of the border network and system alternation, or the equipment is neglected to manage. So, the professional technology and the management of the organization personnel and equipment are required to prevent the crisis caused by the man-in-the-middle attack. Therefore, the prevention structure defines the situation in which the man-in-the-middle attacks occur at various stages in the crisis life cycle. The appropriate prevention methods include, such as confirming the correctness of the transmission channel during the prodromal stage, communicating with the user during the chronic stage, and revisiting past improvements during the resolution stage
第一章、緒論 ............................................................................................................... 1
1.1 研究背景 .......................................................................................................................... 1 1.2 研究動機 .......................................................................................................................... 3 1.3 研究目的 .......................................................................................................................... 6
第二章、文獻探討........................................................................................................ 7
2.1 物聯網與資訊安全介紹 ................................................................................................... 7 2.1.1 物聯網架構 ..................................................................................................................... 7 2.1.2 資訊安全 ....................................................................................................................... 10 2.1.3 網路或計算機攻擊分類 .............................................................................................. 11 2.1.4 物聯網的資訊安全 ...................................................................................................... 12 2.2 中間人攻擊介紹............................................................................................................. 13 2.2.1 分散式阻斷服務攻擊(Distributed denial of service attack,DDoS) ...................... 14 2.1.2Karma 攻擊 ................................................................................................................... 15 2.2.3 隱身中間人攻擊(Stealth Man-in-The-Middle,SMiTM) ......................................... 16 2.2.4 高級隱身中間人攻擊(Advanced Stealth Man-in-The-Middle,ASMiTM) ................ 17 2.2.5 ARP 緩存中毒(ARP cache poisoning) ......................................................................... 18 2.3 緩存中毒(ARP cache poisoning)相關研究 .................................................................... 20
第三章、研究方法.......................................................................................................24
3.1 設計科學 ........................................................................................................................ 24 3.2 研究架構 ........................................................................................................................ 26 3.3 研究流程細節與步驟 ..................................................................................................... 26
第四章、研究結果與討論 ...........................................................................................28
4.1 危機生命週期 ................................................................................................................ 28 4.2 文獻收集.......................................................................................................................30
4.3 新聞報導 ........................................................................................................................ 33
4.4 專家訪談.......................................................................................................................38
4.4.1 專家訪談 ....................................................................................................................... 38 4.4.2 MITM 防護架構 V3................................................................................................... 39 4.4.3 MITM 防護架構 V4................................................................................................... 41 4.4.4 MITM 防護架構 V5 ..................................................................................................... 43 4.4.5 MITM 防護架構 V6 ..................................................................................................... 45
4.4.6 MITM 防護架構 V7 ..................................................................................................... 46 4.4.7 MITM 防護架構統整 ................................................................................................... 48
第五章、結論與未來方向 ...........................................................................................50
5.1 結論..............................................................................................................................50
5.2 研究貢獻.......................................................................................................................52
5.3 研究限制.......................................................................................................................52
參考文獻......................................................................................................................54
附錄A-北市單一陳請系統資安問題新聞摘錄 ............................................................61

網路資料

林慶桓與劉崇堅(民 102 年 1 月 22 日)。參加「2012 物聯網(IoT2012)國際會議」 報告。民 106年10月15日,取自國家通訊傳播委員會網頁: https://www.ncc.gov.tw/chinese/files/13092/2893_30578_130927_1.pdf
吳金榮(民 106 年 2 月 5 日)。【趨勢大師】物聯網連網裝置數量大幅成長。蘋果 新聞網。民 106 年 10 月 8 日,取自 http://www.appledaily.com.tw/realtimenews/article/new/20170215/1054623/
周碩彥( 民 104 年 11 月 30 日)。物聯網發展趨勢展示內容。工業管理系政府研究計 畫。民 106年10 月 15 日,取自 https://www.naer.edu.tw/ezfiles/0/1000/attach/95/pta_9695_1581881_06359.pdf
物聯網的最佳合作夥伴!資策會 In-Snergy 可創造無限應用的聯網平台 從模組、裝 置、雲端、應用,一手包辦!(民 106 年 4 月 13 日) 。中央通訊社。民 106 年 10 月 8 日,取自 http://www.cna.com.tw/postwrite/Detail/211693.aspx#.WehtjhOCzOQ
陳家祥(民 106 年 7 月 13 日)。單一陳情→單一出賣 北市 APP 平台再傳資安漏洞。 雲論名人論壇。民 106 年 10 月 18 日,取自https://www.ettoday.net/news/20170713/965719.htm?feature=todaysforum&tab_id=268 Google Glass.(2014). Google Glass: Make Glass Your Own. Retrieved October, 8, 2017
from https://www.youtube.com/watch?v=eneEmDtSvzI.
Internet Crime Complaint Center , 2016 Internet Crime Report . Retrieved October, 8,
2017 from:https://pdf.ic3.gov/2016_IC3Report.pdf
Kropeit, T. (2015). Don’t Trust Open Hotspots: Wi-Fi Hacker Detection and Privacy Protection
via Smartphone. BS Thesis. Retrieved October, 8, 2017 from: https://www. emsec. rub.
de/media/attachments/files/2015/03/BA Kropeit. pdf.
LNR Group. (2012). arpwatch, the Ethernet monitor program; for keeping track of ethernet/ip
address pairings. Last accessed April, 17
Trend Micro. (2015, March 5). 5 Possible Attacks on the IoE and How to Prevent Them. Retrieved
October, 18, 2017, from http://blog.trendmicro.com/5-possible-attacks-on-the-ioe-and- how-to-prevent-them/?linkId=12742900
英文文獻
Abad, C. L., & Bonilla, R. I. (2007). An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. Paper presented at the Distributed Computing Systems Workshops, 2007. ICDCSW07. 27th International Conference on.
Agarwal, M., Biswas, S., & Nandi, S. (2015). Advanced stealth man-in-the-middle attack in wpa2 encrypted wi-fi networks. IEEE Communications Letters, 19(4), 581-584.
Ahmad, M. S. (2010). Wpa too! DEF CON, 18.
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
Ashton, K. (2009). That ‘internet of things’ thing. RFID journal, 22(7), 97-114.
Bishop, M. (1995). A taxonomy of unix system and network vulnerabilities: Technical Report
CSE-95-10, Department of Computer Science, University of California at Davis.
Bruschi, D., Ornaghi, A., & Rosti, E. (2003). S-ARP: a secure address resolution protocol. Paper
presented at the Computer Security Applications Conference, 2003. Proceedings. 19th
Annual.
Carnut, M., & Gondim, J. (2003). ARP spoofing detection on switched Ethernet networks: A
feasibility study. Paper presented at the Proceedings of the 5th Simposio Seguranca em
Informatica.
Coetzee, L., & Eksteen, J. (2011). The Internet of Things-promise for the future? An introduction.
Paper presented at the IST-Africa Conference Proceedings, 2011.
Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE
Communications Surveys & Tutorials, 18(3), 2027-2051.
Da Xu, L., He, W., & Li, S. (2014). Internet of things in industries: A survey. IEEE Transactions
on industrial informatics, 10(4), 2233-2243.
Denning, P.J. "A New Social Contract for Research," Communications of the ACM (40:2), February 1997, pp. 132-134.
Fink, S. (1986). Crisis management: Planning for the inevitable. American Management Association.
Ghering, M., & Poll, E. (2016). Evil Twin Vulnerabilities in Wi-Fi Networks.
Gouda, M. G., & Huang, C.-T. (2003). A secure address resolution protocol. Computer Networks,
41(1), 57-71.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Hansman, S., & Hunt, R. (2005). A taxonomy of network and computer attacks. Computers & Security, 24(1), 31-43.
Hevner, A. R., March, S. T., Park, J., & Ram, S. (2008). Design science in information systems research. Management Information Systems Quarterly, 28(1), 6.
Howard, J. D. (1997). An analysis of security incidents on the Internet 1989-1995: Carnegie- Mellon Univ Pittsburgh PA.
Mitroff, I. I. (1994). Crisis management and environmentalism: A natural fit. California management review, 36(2), 101-113.
Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012). RFID technology and its applications in Internet of Things (IoT). Paper presented at the Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on.
Krige, W. (1999). The usage of audit logs for effective information security management. Unpublished master’s thesis. Port Elizabeth Technikon, Port Elizabeth, South Africa.
Kumar, V., Chakraborty, S., Barbhuiya, F. A., & Nandi, S. (2012). Detection of Stealth Man-in- the-Middle attack in Wireless LAN. Paper presented at the Parallel distributed and grid computing (PDGC), 2012 2nd IEEE international conference on.
Lau, F., Rubin, S. H., Smith, M. H., & Trajkovic, L. (2000). Distributed denial of service attacks. Paper presented at the Systems, Man, and Cybernetics, 2000 IEEE International Conference on.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
Lee, J. D., & See, K. A. (2004). Trust in automation: Designing for appropriate reliance. Human factors, 46(1), 50-80.
Lipson, H. F. (2002). Tracking and tracing cyber-attacks: Technical challenges and global policy issues: CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST.
Liu, C. H., Yang, B., & Liu, T. (2014). Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Networks, 18, 85-101.
Lough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks. Virginia Tech.
March, S. T., & Smith, G. F. (1995). Design and natural science research on information
technology. Decision support systems, 15(4), 251-266.
Markus, M.L., Majchrzak, A., and Gasser, L., "A Design Theory for Systems that Support Emergent Knowledge Processes," MIS Quarterly (26:3), September, 2002, pp. 179- 212.
Meng, D., & WU, C. Y. L. (2011). Security architecture and key technologies for IoT/CPS. ZTE technology journal, 1(1), 013.
Micro, T. (2013). Blurring boundaries: Trend Micro security predictions for 2014 and beyond. Retrieved April, 1, 2015.
Mirkovic, J., & Reiher, P. (2004). A taxonomy of DDoS attack and DDoS defense mechanisms. ACM SIGCOMM Computer Communication Review, 34(2), 39-53.
Ornaghi, A., & Valleri, M. (2003). Man in the middle attacks. Paper presented at the Blackhat Conference Europe.
Pingle, B., Mairaj, A., & Javaid, A. Y. (2018, May). Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use. In 2018 IEEE International Conference on Electro/Information Technology (EIT) (pp. 0192-0197). IEEE.
Ramachandran, V., & Nandi, S. (2005). Detecting ARP spoofing: An active technique. Paper presented at the International Conference on Information Systems Security.
Silver, M. S., Markus, M. L., & Beath, C. M. (1995). The information technology interaction model: A foundation for the MBA core course. MIS quarterly, 361-390.
Simon, H.A. The Sciences of the Artificial, 3rd Edition, MIT Press, Cambridge, MA, 1996.
Söllner, M., Hoffmann, A., & Leimeister, J. M. (2016). Why different trust relationships matter for information systems users. European Journal of Information
Systems, 25(3), 274-287.
Standard, A. (2015). ISO/IEC 27002. Information technology-security techniques-code of practice for information security controls,(AS ISO/IEC 27002: 2015), Standards Australia.
Strategy, I., & Unit, P. (2005). ITU Internet Reports 2005: The internet of things. Geneva: International Telecommunication Union (ITU), 1, 62.
Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: a review. Paper presented at the Computer Science and Electronics Engineering (ICCSEE), 2012 international conference on.
Tripunitara, M. V., & Dutta, P. (1999). A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning. Paper presented at the
Computer Security Applications Conference, 1999.(ACSAC99) Proceedings. 15th Annual.
Tsichritzis, D. "The Dynamics of Innovation," Beyond Calculation: The Next Fifty Years of Computing, Copernicus, 1997, pp. 259-265.
Tsitroulis, A., Lampoudis, D., & Tsekleves, E. (2014). Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security, 6(1), 93-107. Vallivaara, V. A., Sailio, M., & Halunen, K. (2014). Detecting man-in-the-middle attacks on non-
mobile systems. Paper presented at the Proceedings of the 4th ACM conference on Data and application security and privacy.
Walls, J. G., Widmeyer, G. R., & El Sawy, O. A. (1992). Building an information system design theory for vigilant EIS. Information systems research, 3(1), 36-59.
Whalen, S. (2001). An introduction to ARP spoofing. Online document.
Yang, G., Xu, J., Chen, W., Qi, Z.-H., & Wang, H.-Y. (2010). Security characteristic and
technology in the internet of things. Nanjing Youdian Daxue Xuebao(Ziran Kexue Ban)/ Journal of Nanjing University of Posts and Telecommunications(Natural Nanjing University of Posts and Telecommunications(Natural, 30(4).
Yu, Y., Wang, J., & Zhou, G. (2010). The exploration in the education of professionals in applied Internet of Things engineering. Paper presented at the Distance Learning and Education (ICDLE), 2010 4th International Conference on.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top