博碩士論文 975402003 完整後設資料紀錄

DC 欄位 語言
DC.contributor資訊工程學系zh_TW
DC.creator歐智文zh_TW
DC.creatorChih-Wen Ouen_US
dc.date.accessioned2019-7-12T07:39:07Z
dc.date.available2019-7-12T07:39:07Z
dc.date.issued2019
dc.identifier.urihttp://ir.lib.ncu.edu.tw:88/thesis/view_etd.asp?URN=975402003
dc.contributor.department資訊工程學系zh_TW
DC.description國立中央大學zh_TW
DC.descriptionNational Central Universityen_US
dc.description.abstract隨著這幾年雲端物聯網裝置產品快速普及,其與桌上終端,或是手機平板 等等的行動終端不同的地方主要有兩點。第一點,雲端物聯網裝置的 產品成本通常較桌上與行動終端低,因此多數的雲端物聯網產品的安 全性無法滿足基本的資安要求。第二點,雲端物聯網裝置的使用者介 面明顯不同於桌上行動終端。物聯網裝置的操作介面大多數只是簡 單的燈號,除非透過專業工具,否則一般使用者難以於日常使用中 快速發覺物聯網裝置的異常運作行為。調查發現,部分雲端物聯網 裝置設有基於HTTPS的設定網頁提供給使用者去進行裝置設定,這 些HTTPS網頁已成為雲端物聯網殭屍網路入侵的主要目標。對於網路 服務提供者以及大多數雲端物聯網裝置產品而言,他們預期的客戶應 請求來自於桌上或行動終端的瀏覽器,或是自家開發的客戶端App, 來自於陌生的雲端物聯網裝置的服務請求基本上是在預期之外的。若 網站服務端的管理者以及雲端物聯網裝置可偵測出遠端的客戶裝置屬 於物聯網裝置而非預期的桌上或行動終端瀏覽器時,網站服務端以及 雲端物聯網裝置便可根據預先定義的措施來處理這些來者不善的請 求,從而避免後續針對該網站以及雲端物聯網的潛在惡意行為。本研 究提出了可於雲端物聯網裝置運作之偵測連入裝置為雲端物聯網裝置 之技術,取名為CSPWN偵測器。本研究基於物聯網裝置與桌上型電 腦跟行動裝置先天性計算能力的差異,找出穩定性高且可識別偵測位 於遠端網路雲端物聯網裝置的方法。簡單而言,此方法取得遠端裝置 進行金鑰產製的計算時間,並利用此時間差異來做為判定裝置的依 據。此法不僅穩定可信避免特徵資料庫慣有的時效問題之外,即使雲 端物聯網裝置在遠端網路也能準確偵測。實驗結果顯示,CSPWN偵 測器偵測雲端物聯網裝置擁有九成以上的正確率,其中五個裝置的正 確率超過98%。偵測非雲端物聯網裝置也擁有八成的正確率,其中五 個非雲端物聯網裝置也擁有九成以上的正確率。zh_TW
dc.description.abstractAs Internet-of-Things (IoT) devices went popular in recent years, they have become ideal targets for malicious activists, especially for botnet activists. Due to the low cost nature of most IoT devices, the security protection among these cheap devices is often insufficient. Mi- rai botnet is a typical IoT botnet. It is composed of compromised IoT devices, and using these IoT devices to compromise other vulnerable IoT devices across Internet. The Web interface of these vulnerable IoT devices is a major target aimed by Mirai. Most of these targeted IoT devices run the Web interface over HTTPS. For most administrators of Web sites and owners of cloud IoT devices, they may expect that their clients use browsers or their proprietary client Apps to visit their Web interface. Hence, the visiting coming from unknown cloud IoT devices is basically unexpected or even undesired. Under the situation of so many unidentified cloud IoT devices on Internet, the IoT device detec- tion is ideal so that the Web interface can directly reject the connection from unexpected cloud IoT devices. In this dissertation, we propose an approach, named CSPWN Detector, protecting HTTPS-based Web ser- vices, including Web services running on the IoT devices, from accessed by other undesired cloud IoT devices on Internet. CSPWN Detector basically works on diversified key exchange calculation time during TLS negotiation between IoT and non-IoT devices. The result of accuracy evaluation shows that with a best threshold value, CSPWN Detector can detect six IoT devices with the accuracy of 91.6% at least. The accu- racy among five of these six IoT devices are at least 98.1%. Meanwhile, CSPWN Detector can detect six non-IoT devices with the accuracy of 82.5% at least. If the six year old tablet is excluded, the accuracy among rest five of these six non-IoT devices are at least 90.6%.en_US
DC.subject雲端zh_TW
DC.subject物聯網zh_TW
DC.subject識別zh_TW
DC.subject傳輸層安全協定zh_TW
DC.subject殭屍網路zh_TW
DC.subjectCPUen_US
DC.subjectIoTen_US
DC.subjectfingerprintingen_US
DC.subjectTLSen_US
DC.subjectnegotiationen_US
DC.titleCSPWN: A Solution to Protect HTTPS-based Services From Compromised Internet-of-Thingsen_US
dc.language.isoen_USen_US
DC.type博碩士論文zh_TW
DC.typethesisen_US
DC.publisherNational Central Universityen_US

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明