跳到主要內容

臺灣博碩士論文加值系統

(44.210.85.190) 您好!臺灣時間:2022/12/10 13:57
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:馮然
研究生(外文):Jan Feng
論文名稱:在 LTE 實驗網路上實作分散式阻斷攻擊
論文名稱(外文):Implementing DDoS Attacks in Experimental LTE Networks
指導教授:鄭欣明鄭欣明引用關係
指導教授(外文):Shin-Ming Cheng
口試委員:黃俊穎徐瑞壕沈上翔
口試委員(外文):Chun-Ying HuangRuei-Hau HsuShan-Hsiang Shen
口試日期:2020-01-22
學位類別:碩士
校院名稱:國立臺灣科技大學
系所名稱:資訊工程系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2020
畢業學年度:108
語文別:英文
論文頁數:32
中文關鍵詞:分散式阻斷攻擊第四代移動通訊技術長期演進技術開源軟體
外文關鍵詞:DDoS4GLTEOpenAirInterface
相關次數:
  • 被引用被引用:0
  • 點閱點閱:193
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Chinese Abstract
Abstract
Table of Contents
List of Tables
List of Illustrations
1 Introduction
2 Background and Related Work
2.1 LTE Network Architecture
2.2 IP-Based DDoS Attacks
2.2.1 Direct Flooding
2.2.2 Volume Amplification
2.2.3 Handshake Protocol
2.3 DoS and DDoS Attacks in LTE Networks
2.3.1 IP-Based DDoS Attacks in LTE Networks
2.3.2 DoS and DDoS Attacks designed for LTE Networks
3 System Model
3.1 System Architecture
3.2 Adversary model
3.3 Monitoring module
4 DDoS Attacks in LTE network
4.1 Direct Flooding
4.2 Volume Amplification Attacks
4.3 Handshake Protocol Attacks
5 Experimental Results
5.1 Experimental Environment Setup
5.1.1 Attack Module in the UE side
5.1.2 Monitoring Module in the CN
5.2 Performance Evaluation
6 Conclusions
References
[1] S. Mavoungou, G. Kaddoum, M. Taha, and G. Matar, “Survey on threats and attacks on mobile networks,” IEEE Access, vol. 4, pp. 4543–4572, Aug. 2016.
[2] D. Rupprecht, A. Dabrowski, T. Holz, E. Weippl, and C. Pöpper, “On security research towards future mobile network generations,” IEEE Commun. Surveys Tuts., vol. 20, no. 3, pp. 2518–2542, 3rd-quarter 2018.
[3] S. Steig, A. Aarnes, T. Van Do, and H. T. Nguyen, “A network based IMSI catcher detection,” in Proc. IEEE ICITCS 2016, Sep. 2016.
[4] S. Park, A. Shaik, R. Borgaonkar, A. Martin, and J.-P. Seifert, “Whitestingray: Evaluating IMSI catchers detection applications,” in Proc. USENIX WOOT 2017, Aug. 2017.
[5] A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, and J.-P. Seifert, “Practical attacks against privacy and availability in 4G/LTE mobile communication sys- tems,” in Proc. NDSS 2016, Feb. 2016.
[6] A. Shaik, R. Borgaonkar, S. Park, and J.-P. Seifert, “On the impact of rogue base stations in 4G/LTE self organizing networks,” in Proc. ACM WiSec 2018, Jun. 2018, pp. 75–86.
[7] T. Fei and W. Wang, “LTE is vulnerable: Implementing identity spoofing and Denial-of-Service attacks in LTE networks,” in Proc. IEEE Globecom 2019, Dec. 2019.
[8] M. Khosroshahy, D. Qiu, and M. K. M. Ali, “Botnets in 4G cellular networks: Platforms to launch DDoS attacks against the air interface,” in Proc. MoWNeT 2013, Aug. 2013, pp. 30–35.
[9] J. Henrydoss and T. Boult, “Critical security review and study of DDoS attacks on LTE mobile network,” in Proc. APWIMOB 2014, Aug. 2014, pp. 194–200.
[10] R. P. Jover, “Security attacks against the availability of LTE mobility networks: Overview and research directions,” in Proc. IEEE WPMC 2013, Jun. 2013.
27
[11] A. Gupta, T. Verma, S. Bali, and S. Kaul, “Detecting MS initiated signaling DDoS attacks in 3G/4G wireless networks,” in Proc. COMSNETS 2013, Jan. 2013.
[12] A. Shaik, R. Borgaonkar, S. Park, and J.-P. Seifert, “New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities,” in Proc. ACM WiSec 2019, May 2019, pp. 221–231.
[13] G. Lee, J. Lee, J. Lee, Y. Im, M. Hollingsworth, E. Wustrow, D. Grunwald, and S. Ha, “This is your president speaking: Spoofing alerts in 4G LTE networks,” in Proc. ACM MobiSys 2019, Jun. 2019, pp. 404–416.
[14] R. P. Jover, “LTE security, protocol exploits and location tracking experimen- tation with low-cost software radio,” arXiv preprint arXiv:1607.05171, Jul. 2016.
[15] R. Borgaonkar, L. Hirschi, S. Park, and A. Shaik, “New privacy threat on 3G, 4G, and upcoming 5G AKA protocols,” Proceedings on Privacy Enhancing Technologies, vol. 3, pp. 108–127, Jul. 2019.
[16] D. Rupprecht, K. Kohls, T. Holz, and C. Pöpper, “Breaking LTE on layer two,” in Proc. IEEE S&P 2019, May 2019.
[17] W.-L. Heish, B.-K. Hong, and S.-M. Cheng, “Toward large-scale rogue base station attacks using container-based virtualization,” in Proc. IEEE VTC-Fall 2019, Sep. 2019.
[18] P. Farina, E. Cambiaso, G. Papaleo, and M. Aiello, “Understanding DDoS attacks from mobile devices,” in Proc. FiCloud 2015, Aug. 2015, pp. 614–619.
[19] Y. Kouraogo, K. Zkik, G. Orhanou et al., “Attacks on Android banking appli- cations,” in Proc. ICEMIS 2016, Sep. 2016.
[20] Y.-a. Tan, Y. Xue, C. Liang, J. Zheng, Q. Zhang, J. Zheng, and Y. Li, “A root privilege management scheme with revocable authorization for Android devices,” Journal of Network and Computer Applications, vol. 107, pp. 69–82, Apr. 2018.
[21] N. Agrawal and S. Tapaswi, “Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges,” IEEE Commun. Surveys Tuts., vol. 21, no. 4, pp. 3769–3795, 4th-quarter 2019.
[22] T. Byrd, V. Marojevic, and R. P. Jover, “CSAI: Open-source cellular radio access network security analysis instrument,” arXiv:1905.07617, May 2019.
[23] X. Hu, C. Liu, S. Liu, W. You, Y. Li, and Y. Zhao, “A systematic analysis method for 5G Non-Access stratum signalling security,” IEEE Access, vol. 7, pp. 125 424–125 441, Aug. 2019.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊