摘要(英) |
In recent years, how to prevent cyber attacks has always been in the field of research. Attackers will hide when they are attacking so that defenders or investigators cannot grasp the attackers behind them. Among them, the security problems of the increment of the Internet of Things (IoT) will come to the forefront. Mirai, a malware attacking IoT devices, and the problem on a network camera with default password issue, harm and leak the privacy of innocent people. The attacks cause harm to the world such as DDoS attacks that affect network bandwidth, email spam, vulnerability mining, user privacy leaks, and etc. These attacks will be more difficult to defend due to the increase in IoT devices. However, the detection and defense of IoT devices are still in its infancy. In this paper, an IoTD method will be proposed from the perspective of spam to detect whether a sender of the mail is an IoT device, and thus effectively use this information in security research field in the future. |
參考文獻 |
[1] Gartner, “Gartner Says 4.9 Billion Connected ‘Things’Will Be in Use in 2015,”2014,
http://www.gartner.com/newsroom/id/2905717.
[2] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An Experimental
Study of Security and Privacy Risks with Emerging Household Appliances,”in Proc.
International Workshop on Security and Privacy in Machine-to-Machine Communications
(M2MSec), Oct 2014.
[3] S. Grover and N. Feamster,“The Internet of Unpatched Things,”in Proc. FTC PrivacyCon,
Jan 2016.
[4]“Your Fridge is Full of SPAM: Proof of An IoT-driven Attack,”Jan 2014,
https://www.proofpoint.com/us/threat-insight/post/Your-Fridgeis-
Full-of-SPAM. (Accessed on 5/2/2018)
[5] Justin M. Rao and David H. Reiley, “The Economics of Spam,”Journal of Economic
Perspectives??Volume 26, Number 3??Summer 2012??Pages 87–110, 2012.
[6] M3AAWG,“Email metrics report,”Nov 2014, https://www.m3aawg.org/for-theindustry/
email-metrics-report. (Accessed on 4/17/2018)
[7] Nadezhda Demidova, Tatyana Shcherbakova, Maria Vergelis, “Spam and phishing in
Q1 2018”, 2018, https://securelist.com/spam-and-phishing-in-q1-2018/
85650/. (Accessed on 4/26/2018)
[8] RFC 3207, SMTP Service Extension for Secure SMTP over Transport Layer Security, 2002.
[9] RFC 7598, Deprecating Secure Sockets Layer Version 3.0, 2015.
[10] Adam Langley, “Disabling SSLv3 and RC4,”Google Security Blog, 2015, https://
security.googleblog.com/2015/09/disabling-sslv3-and-rc4.html.
[11]“The Transport Layer Security (TLS) Protocol Version 1.3,”2018, https://tools.ietf.
org/html/draft-ietf-tls-tls13-28.
[12] Kuo, Fang-Chun and Tschofenig, Hannes and Meyer, Fabian and Fu, Xiaoming,
“Comparison studies between pre-shared key and public key exchange mechanisms for transport
layer security (TLS),”Institute for Informatics, University of Goettingen, Technical
Report IFI-TB-2006-01, 2006
[13] Vincent Berna,“TLS and Perfect Forward Secrecy,”2011, https://vincent.bernat.
im/en/blog/2011-ssl-perfect-forward-secrecy.
[14] Zhao, Li and Iyer, Ravi and Makineni, Srihari and Bhuyan, Laxmi, “Anatomy and Performance
of SSL Processing”, IEEE International Symposium on, page 197-206,” 2005.
[15] Postfix, http://www.postfix.org/
[16] Binu Ramakrishnan, “Measuring SMTP STARTTLS Deployment Quality,” 2015,
https://yahoo-security.tumblr.com/post/141495385400/measuringsmtp-
starttls-deployment-quality
[17] Facebook, “The Current State of SMTP STARTTLS Deployment,”2014,
https://www.facebook.com/notes/protect-the-graph/the-currentstate-
of-smtp-starttls-deployment/1453015901605223/.
[18] Incenp.org,“SMTP-over-TLS usage stats,”2017, https://incenp.org/notes/2017/
smtp-starttls-usage.html.
[19] Meidan, Yair et al., “Detection of Unauthorized IoT Devices Using Machine Learning
Techniques,”arXiv preprint arXiv:1709.04647, 2017.
[20] J. Pang et al., “802.11 user fingerprinting,”in Proceedings of the 13th Annual ACM International
Conference on Mobile Computing and Networking, ser. MobiCom ’07. ACM,
2007, pp. 99–110.
[21] R. Tomsˇu? et al.,“Profiling users by modeling web transactions,”in IEEE International
Conference on Distributed Computing Systems, 2017
[22] Bruhadeshwar |