簡易檢索 / 詳目顯示

研究生: 林家諄
Jia-Jhun Lin
論文名稱: 從虛擬網路的觀點設計大規模物聯網誘捕網路
Design of Large-Scale IoT Honeynet form the Perspective of Virtualized Netwworks
指導教授: 鄭欣明
Shin-Ming Cheng
口試委員: 李漢銘
Hahn-Ming Lee
黃俊穎
Chun-Ying Huang
蕭旭君
Hsu-Chun Hsiao
沈上翔
Shan-Hsiang Shen
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 36
中文關鍵詞: 物聯網蜜罐網路物聯網虛擬化自動部屬
外文關鍵詞: IoT, honeynet, IoT virtualize, auto-deployed
相關次數: 點閱:242下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報


Chinese Abstract Abstract Table of Contents List of Tables List of Illustrations Introduction Related Work System Background Experiment Performance Analysis Conclusions & Future work

[1] J. Granjal, E. Monteiro, and J. Sá Silva, “Security for the internet of things: A survey of existing protocols and open research issues,” IEEE Communications Surveys Tutorials, vol. 17, no. 3, pp. 1294–1312, thirdquarter 2015.
[2] M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the iot world: Present and future challenges,” IEEE Internet of Things Journal, vol. 5, no. 4, pp. 2483–2495, Aug 2018.
[3] S. Cheng, P. Chen, C. Lin, and H. Hsiao, “Traffc-aware patching for cyber security in mobile iot,” IEEE Communications Magazine, vol. 55, no. 7, pp. 29–35, July 2017.
[4] D. N. Serpanos and A. G. Voyiatzis, “Security challenges in embedded systems,” ACM Trans. Embed. Comput. Syst., vol. 12, no. 1s, pp. 66:1–66:10, Mar. 2013
[5] D. Papp, Z. Ma, and L. Buttyan, “Embedded systems security: Threats, vulner- abilities, and attack taxonomy,” in 2015 13th Annual Conference on Privacy, Security and Trust , July 2015, pp. 145–152.
[6] W. Fan, Z. Du, D. Fernández, and V. A. Villagrá, “Enabling an anatomic view to investigate honeypot systems: A survey,” IEEE Systems Journal, vol. 12, no. 4, pp. 3906–3919, Dec 2018.
[7] R. M. Campbell, K. Padayachee, and T. Masombuka, “A survey of honeypot research: Trends and opportunities,” in 2015 10th International Conference for Internet Technology and Secured Transactions, Dec 2015, pp. 208–212.
[8] F. H. Abbasi and R. J. Harris, “Experiences with a generation iii virtual honeynet,” in 2009 Australasian Telecommunication Networks and Applications Conference, Nov 2009, pp. 1–6.
[9] M. Adeel, A. A. Chaudhry, E. Ahmed, K. Samad, and N. M. Shaikh, “Honeynets: An architectural overview,” in 2005 Student Conference on Engineering Sciences and Technology, Aug 2005, pp. 1–6.
[10] W. Fan, Z. Du, and D. Fernández, “Taxonomy of honeynet solutions,” in 2015 SAI Intelligent Systems Conference , Nov 2015, pp. 1002–1009.
[11] I. S. Kim and M. H. Kim, “Agent-based honeynet framework for protecting servers in campus networks,” IET Information Security, vol. 6, no. 3, pp. 202– 211, Sep. 2012.
[12] “Stardust,” Website. [Online]. Available: https://www.nict.go.jp/press/2017/ 05/31-1.html
[13] Y. Tsuda, “Stardust: large-scale infrastructure for luring and monitoring cyber adversaries,” ITU Workshop on Advanced Cybersecurity Attacks and Ran- somware, Aug 2018.
[14] J. Calvet, C. R. Davis, J. M. Fernandez, J.-Y. Marion, P.-L. St-Onge, W. Guizani, P.-M. Bureau, and A. Somayaji, “The case for in-the-lab botnet experimentation: Creating and taking down a 3000-node botnet,” in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC ’10. New York, NY, USA: ACM, 2010, pp. 141–150.
[15] K. B. Vanderveen, R. G. Minnich, C. T. Deccio, J. F. Floren, A. J. Sweeney, K. K. Watts, D. W. Rudish, D. J. Fritz, and Y. R. Choe, “Large-scale botnet analysis on a budget.” Sandia National Lab., Livermore, CA (United States), Tech. Rep., 2011.
[16] A. Kumar and T. J. Lim, “A secure contained testbed for analyzing iot botnets,” Testbeds and Research Infrastructures for the Development of Networks and Communities, p. 124–137, 2019.
[17] F. Dang, Z. Li, Y. Liu, E. Zhai, Q. A. Chen, T. Xu, Y. Chen, and J. Yang, “Understanding leless attacks on linux-based iot devices with honeycloud,” in Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2019, pp. 482–493.
[18] Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, “Iotpot: Analysing the rise of iot compromises,” in 9th USENIX Workshop on O ensive Technologies. Washington, D.C.: USENIX Association, 2015.
[19] H. Šemić and S. Mrdovic, “Iot honeypot: A multi-component solution for handling manual and mirai-based attacks,” in 2017 25th Telecommunication Forum, Nov 2017, pp. 1–4.
[20] D. Fraunholz, D. Krohmer, S. D. Anton, and H. Dieter Schotten, “Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot,” in 2017 International Conference on Cyber Security And Protection Of Digital Services, June 2017, pp. 1–7.
[21] U. D. Gandhi, P. M. Kumar, R. Varatharajan, G. Manogaran, R. Sundarasekar, and S. Kadu, “Hiotpot: Surveillance on iot devices against recent threats,” Wireless Personal Communications, vol. 103, pp. 1179–1194, 2018.
[22] M. Wang, J. Santillan, and F. Kuipers, “Thingpot: an interactive internet-of- things honeypot,” CoRR, vol. abs/1807.04114, 2018.
[23] J. Guarnizo, A. Tambe, S. S. Bhunia, M. Ochoa, N. O. Tippenhauer, A. Shabtai, and Y. Elovici, “SIPHON: towards scalable high-interaction physical honeypots,” CoRR, vol. abs/1701.02446, 2017.
[24] T. Luo, Z. Xu, X. Jin, Y. Jia, and X. Ouyang, “Iotcandyjar : Towards an intelligent-interaction honeypot for iot devices,” 2017
[25] M. A. Hakim, H. Aksu, A. S. Uluagac, and K. Akkaya, “U-pot: A honeypot framework for upnp-based iot devices,” CoRR, vol. abs/1812.05558, 2018.
[26] “Open source software for creating private and public clouds.” Website. [Online]. Available: https://www.openstack.org/
[27] “Cloud-init,” Website. [Online]. Available: http://cloudinit.readthedocs.org/en/latest
[28] K. Morris, Infrastructure as Code. O’Reilly Media, June 2016.
[29] “Introduction to terraform,” Website. [Online]. Available: https: //www.terraform.io/intro/index.html

無法下載圖示 全文公開日期 2024/08/27 (校內網路)
全文公開日期 本全文未授權公開 (校外網路)
全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
QR CODE