English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 80990/80990 (100%)
造訪人次 : 40251148      線上人數 : 349
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋


    請使用永久網址來引用或連結此文件: http://ir.lib.ncu.edu.tw/handle/987654321/89889


    題名: 基於區塊鏈與代理重新加密之隱私保護威脅情資分享平台;A Privacy-Preserving Threat Intelligence Sharing Platform Based on Blockchain and Proxy Re-Encryption
    作者: 陳冠瑜;Chen, Guan-Yu
    貢獻者: 資訊管理學系
    關鍵詞: 區塊鏈;代理重新加密;布隆過濾器;分散式阻斷服務攻擊;誘因式代幣;Blockchain;Proxy re-encryption;Bloom filter;Distributed denial of service;Incentive coin
    日期: 2022-08-10
    上傳時間: 2022-10-04 12:03:38 (UTC+8)
    出版者: 國立中央大學
    摘要: 近幾年來,分散式阻斷服務攻擊(DDoS)攻擊在是一個非常嚴重的威脅,也是最流行的攻擊之一。各種IoMT平台、網站或伺服器可能會因遭受DDoS攻擊而癱瘓。目前,黑名單存取控制仍然是抵制這些攻擊的有效方法。不幸的是,大多數能夠收集大量威脅情資的資訊安全監控中心(SOC)都拒絕交換他們收集到的寶貴知識。因此,如何有效與公平地共享威脅情資是一個具有前景的研究課題。
    在本文中,我們提出了一個基於區塊鏈的威脅情資共享平台,並且搭配誘因式代幣鼓勵資訊分享。為了保護資料隱私,提議的系統實作了代理重新加密方案,使資料透過加密形式做資訊交換。此外,為了有效地搜尋有用的資料,我們提出的方案設計了一種新穎的布隆過濾器,可以有效地排除無效的數據集。最後的模擬結果表明,本文採用的代理重新加密執行時間優於其他現有方案65%到70%。
    ;In recent decades, Distributed Denial of Service (DDoS) attacks is a very serious threat in today′s, which is one of the most popular attacks. As a consequence, various IoMT platforms, websites and servers could be paralyzed by DDoS attacks. Currently, blacklist access control is still the effective way to resist those attack. Unfortunately, most of security operation centers (SOC) who can gather a lot of threat intelligence refuse to exchange their valuable knowledge due to lack of benefits. Therefore, how to effective and fair sharing threat intelligence is a promising research topic.
    In this article, we proposed a blockchain-based threat intelligence sharing platform to offer incentive benefit and keep exchange records on smart contracts for transparency. For data privacy, the proposed system implements a proxy re-encryption scheme keeping data in encrypted form. Furthermore, to effectively search useful data, our scheme proposed a novel bloom filter for data requester, which can effectively rule out inefficacious data set. Our simulation results show that the execution time of proxy re-encryption is about 65\%-70\% better than other existing schemes.
    顯示於類別:[資訊管理研究所] 博碩士論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML63檢視/開啟


    在NCUIR中所有的資料項目都受到原著作權保護.

    社群 sharing

    ::: Copyright National Central University. | 國立中央大學圖書館版權所有 | 收藏本站 | 設為首頁 | 最佳瀏覽畫面: 1024*768 | 建站日期:8-24-2009 :::
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 隱私權政策聲明