博碩士論文 984203050 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:77 、訪客IP:3.145.171.99
姓名 歐書甫(Shu-Fu Ou)  查詢紙本館藏   畢業系所 資訊管理學系
論文名稱 車載網路上基於狀態判斷之共謀攻擊偵測機制
(State-based Collusion Attack Detection Mechanism for Vehicular Ad Hoc Networks)
相關論文
★ 應用數位版權管理機制於數位影音光碟內容保護之研究★ 以應用程式虛擬化技術達成企業軟體版權管理之研究
★ 以IAX2為基礎之網頁電話架構設計★ 應用機器學習技術協助警察偵辦詐騙案件之研究
★ 擴充防止詐欺及保護隱私功能之帳戶式票務系統研究-以大眾運輸為例★ 網際網路半結構化資料之蒐集與整合研究
★ 電子商務環境下網路購物幫手之研究★ 網路安全縱深防護機制之研究
★ 國家寬頻實驗網路上資源預先保留與資源衝突之研究★ 以樹狀關聯式架構偵測電子郵件病毒之研究
★ 考量地區差異性之隨選視訊系統影片配置研究★ 不信任區域網路中數位證據保留之研究
★ 入侵偵測系統事件說明暨自動增加偵測規則之整合性輔助系統研發★ 利用程序追蹤方法關聯分散式入侵偵測系統之入侵警示研究
★ 一種網頁資訊擷取程式之自動化產生技術研發★ 應用XML/XACML於工作流程管理系統之授權管制研究
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   [檢視]  [下載]
  1. 本電子論文使用權限為同意立即開放。
  2. 已達開放權限電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。
  3. 請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。

摘要(中) 在現今網路發達的社會中,惡意者相互串聯發動的共謀攻擊是一種常見的攻擊方法。在車載網路這個新興的領域中,也必須考慮發生共謀攻擊的可能並探討其偵測方法。
在過去關於假訊息攻擊的研究中,很少有人討論到共謀攻擊。本研究從共謀的角度出發,依據過去文獻上對不同情境上的共謀攻擊討論,定義出車載網路中的共謀假訊息攻擊,然後利用簡單的循序圖分析車輛在警訊應用服務上的行為,從中發現應用服務中的系統狀態可以使用於偵測攻擊者。我們結合車載網路的地理與時間資源限制以及應用程式執行狀態,設計出基於狀態判斷之共謀偵測機制,將其應用於偵測車載網路中的共謀假訊息攻擊上。
本研究依照所提出之警訊應用服務進行模擬實驗,在環境中有共謀群體串聯發送假訊息,比較本研究與多數決機制的假訊息比例與誤判比例,本研究提出的方法可減少的假訊息與多數決機制相比約達20%,而誤判比例也少於多數決3%至5%。
摘要(英) In modern world of developed networks, it is a common way of attack that malicious users collude with each other. In the new developing area of vehicular ad hoc networks, we should take collusion attack into account as well.
In the past researches about bogus message attack, there are few think about collusion. In this paper, we start from the thought of collusion. By defining the collusion bogus message attack in VANETs according to collusion attacks of different scenarios in the past and with using a simple way to analyze the actions of danger warning application service on vehicles via sequence diagram, we found that the system state of application system could be used in detecting attacker. We combine the restrain of graphical and time resource and the execution state of application service to design a state-based collusion attack detection mechanism. We also exploit the mechanism to detect collusion bogus message attack in VANETs.
We do simulation experiments about the proposed danger warning application service. Collusion groups collude to send bogus messages in the experimental environment. The percentage of bogus message and false negative rate will be compared between majority voting mechanism and our mechanism. The results show that our proposed mechanism can successfully suppress the number of false message by 20%, and lessen the false positive rate by 3% to 5%.
關鍵字(中) ★ 攻擊偵測
★ 共謀攻擊
★ 車載網路
★ 假訊息攻擊
關鍵字(英) ★ bogus information attack
★ attack detection
★ collusion attack
★ VANETs
論文目次 中文摘要.......................................... i
英文摘要.......................................... ii
圖目錄............................................ vi
表目錄............................................ vii
一、 緒論...................................... 1
1-1研究背景....................................... 1
1-2研究動機與目的................................. 4
1-3研究貢獻....................................... 6
1-4章節架構....................................... 7
二、 相關研究.................................. 8
2-1各領域的共謀攻擊與定義......................... 8
2-1-1 廣義與實體社會中的共謀攻擊.................. 8
2-1-2 資訊系統中的共謀攻擊........................ 9
2-2車載網路中的決策與偵測機制..................... 14
三、 基於狀態判斷的共謀攻擊偵測機制............ 18
3-1車載網路道路警訊應用服務....................... 18
3-2攻擊模型....................................... 20
3-3基於狀態判斷的共謀偵測機制..................... 21
四、 模擬實驗與結果討論........................ 29
4-1使用工具....................................... 29
4-2實驗結果....................................... 31
4-2-1 攻擊情境1實驗結果 – 攻擊者發布之假事件所附事件地點於其觀察範圍外...................................... 33
4-2-2 攻擊情境2 實驗結果– 攻擊者發布之假事件所附事件地點於其觀察範圍內...................................... 36
4-2-3 攻擊情境3實驗結果 – 多群共謀群體........... 37
4-3小結........................................... 39
五、 結論與未來研究............................ 41
5-1研究結論與貢獻................................. 41
5-2研究限制....................................... 42
5-3未來研究....................................... 43
六、 參考文獻.................................. 45
參考文獻 中文文獻
[1] 交通部統計處,中華民國交通統計月報,http://www.motc.gov.tw/mocwebGIP/wSite/ct?xItem=4880&ctNode=167&mp=1,民國100年。
[2] 鄭義穎,結合社會網路分析與網絡結構探勘偵測網路拍賣哄抬評價之共犯群體,國立中央大學資訊管理所碩士論文,民國 99 年。
[3] 黃建勳,應用社會網路之信任概念於車載網路上存取控制之研究,國立中央大學資訊管理所碩士論文,民國 99 年。
[4] 柯志亨、林政翰、梁浩銘、余佳育、高谷蘭,計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路,學貫出版,民國 96 年。
英文文獻
[5] World Health Organization Department of Violence & Injury Prevention & Disability (VIP), “Global status report on road safety,” http://www.who.int/violence_injury_prevention/road_safety_status/2009/en/index.html, 2009.
[6] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung and J. Hubaux, “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Communications Magazine, 2008, pp. 100 – 109.
[7] T.L. Willke, P. Tientrakool and N.F. Maxemchuk, “A survey of inter-vehicle communication protocols and their applications,” IEEE Communications Surveys & Tutorials, 2009, pp. 3–20.
[8] T. Moore, “Cooperative attack and defense in distributed networks,” University of Cambridge, 2008.
[9] M. Raya, J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, 2007, pp.39–68.
[10] K. Sampigethaya, M. Li, L. Huang and, R. Poovendran, “AMOEBA: Robust Location Privacy Scheme for VANET,” IEEE Journal on Selected Areas in Communications, 2007, pp. 1569–1589.
[11] U. F. Minhas, J. Zhang, T. Tran and R. Cohen, “A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks,” IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, 2009, pp. 1–14.
[12] M. Raya, P. Papadimitratos, D. Gligor and J. Hubaux, “On Data Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE INFOCOM, 2008, pp. 1238–1246.
[13] B. Ostermaier, F. D‥otzer and M. Strassberger, “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, 2007, pp. 422–431.
[14] G. Philippe, G. Dan and S. Jessica, “Detecting and Correcting Malicious Data in VANETs,” ACM international workshop on Vehicular ad hoc networks, 2004, pp. 29–37.
[15] T. H.-J. Kim, A. Studer, R. Dubey, X. Zhang, A. Perrig, F. Bai, B. Bellur and A. Iyer, “VANET Alert Endorsement Using Multi-Source Filters,” ACM international workshop on VehiculAr InterNETworking, 2010, pp. 51–60.
[16] J. Zhang, “A Survey on Trust Management for VANETs,” International Conference on Advanced Information Networking and Applications, 2011, pp. 105-112.
[17] S. Braynov and M. Jadliwala, “Representation and analysis of coordinated attacks,” ACM workshop on Formal methods in security engineering, 2003, pp. 43-51.
[18] J.K. Lou, K.T. Chen and C.L. Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” In Proceedings of IEEE Consumer Communications and Networking Conference, 2009, pp. 1–5.
[19] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, “A Survey Of Routing Attacks In Mobile Ad Hoc Networks,” IEEE Wireless Communications, 2007, pp. 85–91.
[20] B. Kannhavong, H. Nakayama and A. Jamalipour, “A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks,” IEEE Global Telecommunications Conference, 2006, pp. 1–5.
[21] B. Qureshi, M. Geyong and D. Kouvatsos, “Collusion Detection and Prevention with FIRE+ Trust and Reputation Model,” IEEE International Conference on Computer and Information Technology, 2010, pp. 2548–2555.
[22] S. Ozdemir, “Functional reputation based reliable data aggregation and transmission for wireless sensor networks,” The International Journal for the Computer and Telecommunications Industry, 2008, pp. 592–597.
[23] S. U. Rahman and U. Hengartner, “Secure crash reporting in vehicular Ad hoc networks,” Security and Privacy in Communications Networks and the Workshops, 2007, pp. 443–452.
[24] C. Chen, J. Zhang ; R. Cohen, P. H. Ho, “A Trust Modeling Framework for Message Propagation and Evaluation in VANETs,” Information Technology Convergence and Services, 2010, pp. 1–8.
[25] I. Salhi, M.O. Cherif, S.M. Senouci, “A New Architecture for Data Collection in Vehicular Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.
[26] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, 2007, pp. 2506–2511.
[27] X. Zhuo, J. Hao, D. Liu and Y. Dai, “Removal of Misbehaving Insiders in Anonymous VANETs,” ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, 2009, pp. 106–115.
相關網站
[28] Dedicated short-range communications, http://en.wikipedia.org/wiki/Dedicated_short-range_communications.
[29] IEEE 1609 Working Group Public Site, http://vii.path.berkeley.edu/1609_wave/.
[30] 警政署詐騙排名, http://165.gov.tw/fraud_rank.aspx .
[31] 線上牛津字典, http://www.oxfordadvancedlearnersdictionary.com/dictionary/ .
[32] SUMO, http://sumo.sourceforge.net/.
[33] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/ .
指導教授 陳奕明(Yi-Ming Chen) 審核日期 2011-8-11
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明