研究生: |
謝明諺 MING-YEN HSIEH |
---|---|
論文名稱: |
應用大型語言模型於低功耗藍牙通訊中進行滲透測試及弱點辨識 Applying Large Language Models for Penetration Testing and Vulnerability Identification in Bluetooth Low Energy Communication |
指導教授: |
呂政修
Jenq-Shiou Leu |
口試委員: |
陳郁堂
Yie-Tarng Chen 方文賢 Wen-Hsien Fang 周承復 Cheng-Fu Chou |
學位類別: |
碩士 Master |
系所名稱: |
電資學院 - 電子工程系 Department of Electronic and Computer Engineering |
論文出版年: | 2023 |
畢業學年度: | 112 |
語文別: | 中文 |
論文頁數: | 37 |
中文關鍵詞: | 低功耗藍牙 、漏洞掃描 、滲透測試 、機器學習 、大型語言模型 、自動化分析 、資安強化 |
外文關鍵詞: | Bluetooth Low Energy, Vulnerability Scanning, Penetration Testing, Machine Learning, Large Language Models, Automated Analysis, Cybersecurity Enhancement |
相關次數: | 點閱:63 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
[1] J. DeCuir, "Introducing Bluetooth Smart: Part 1: A look at both classic and new technologies," IEEE Consumer Electronics Magazine, vol. 3, no. 1, pp. 12-18, 2013.
[2] B. Farzaneh, M. A. Montazeri, and S. Jamali, "An anomaly-based IDS for detecting attacks in RPL-based internet of things," in 2019 5th International Conference on Web Research (ICWR), 2019: IEEE, pp. 61-66.
[3] J. T. Vainio, "Bluetooth security," in Proceedings of Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, Seminar on Internetworking: Ad Hoc Networking, Spring, 2000, vol. 5.
[4] A. Barua, M. A. Al Alamin, M. S. Hossain, and E. Hossain, "Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey," IEEE Open Journal of the Communications Society, vol. 3, pp. 251-281, 2022.
[5] M. T. Dini and V. Sokolov, "Penetration tests for Bluetooth low energy and Zigbee using the software-defined radio," arXiv preprint arXiv:1902.08595,2019.
[6] M. Yaseen et al., "Marc: A novel framework for detecting mitm attacks in ehealthcare ble systems," Journal of medical systems, vol. 43, pp. 1-18, 2019.
[7] A. Lahmadi, A. Duque, N. Heraief, and J. Francq, "MitM attack detection in BLE networks using reconstruction and classification machine learning techniques," in Joint European Conference on Machine Learning and Knowledge Discovery in Databases, 2020: Springer, pp. 149-164.
[8] S. Sevier and A. Tekeoglu, "Analyzing the security of Bluetooth low energy," in 2019 International Conference on Electronics, Information, and Communication (ICEIC), 2019: IEEE, pp. 1-5.
[9] S. Pallavi and V. A. Narayanan, "An overview of practical attacks on BLE Based IOT devices and their security," in 2019 5th international conference on advanced computing & communication systems (ICACCS), 2019: IEEE, pp.694-698.
[10] J. Wu et al., "{BLESA}: Spoofing attacks against reconnections in bluetooth low energy," in 14th USENIX Workshop on Offensive Technologies (WOOT 20),2020.
[11] Y. Zhang, J. Weng, R. Dey, Y. Jin, Z. Lin, and X. Fu, "On the (in) security of bluetooth low energy one-way secure connections only mode," arXiv preprint arXiv:1908.10497, 2019.
[12] D. Antonioli, N. O. Tippenhauer, K. Rasmussen, and M. Payer, "BLURtooth: exploiting cross-transport key derivation in bluetooth classic and bluetooth low energy," in Proceedings of the 2022 ACM on Asia conference on computer and communications security, 2022, pp. 196-207.
[13] J. Uher, R. G. Mennecke, and B. S. Farroha, "Denial of Sleep attacks in Bluetooth Low Energy wireless sensor networks," in MILCOM 2016-2016 IEEE Military Communications Conference, 2016: IEEE, pp. 1231-1236.
[14] A. L. Buczak and E. Guven, "A survey of data mining and machine learning methods for cyber security intrusion detection," IEEE Communications surveys & tutorials, vol. 18, no. 2, pp. 1153-1176, 2015.
[15] T. Brown et al., "Language models are few-shot learners," Advances in neural information processing systems, vol. 33, pp. 1877-1901, 2020.
[16] T. Schick et al., "Toolformer: Language models can teach themselves to use tools," arXiv preprint arXiv:2302.04761, 2023.
[17] J. Wei et al., "Chain-of-thought prompting elicits reasoning in large language models," Advances in Neural Information Processing Systems, vol. 35, pp.24824-24837, 2022.