帳號:guest(3.15.18.221)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):吳品曄
作者(外文):Wu, Pin Yeh
論文名稱(中文):利用分散式阻斷服務攻擊手機行動網路的惡意程式
論文名稱(外文):An Android Malware for Mobile Networks Using Distributed Denial of Service Attacks
指導教授(中文):孫宏民
指導教授(外文):Sun, Hung Min
口試委員(中文):林宸堂
黃育綸
吳育松
口試委員(外文):Lin, Chen Tang
Huang, Yu Lun
Wu, Yu Sung
學位類別:碩士
校院名稱:國立清華大學
系所名稱:資訊工程學系
學號:101062627
出版年(民國):105
畢業學年度:104
語文別:英文中文
論文頁數:14
中文關鍵詞:行動網路分散式阻斷服務攻擊惡意程式網際網路協定位址
外文關鍵詞:mobile networksDistributed Denial of Service attackmalwareInternet Protocol Address
相關次數:
  • 推薦推薦:0
  • 點閱點閱:246
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
摘要
智慧型手機與網路的發達為我們的生活帶來了許多便利,也大大的改變
了我們的生活習慣。然而,在我們能夠隨時隨地上網的同時卻也可能因為
對周遭環境的不注意而引發潛在危機。近幾年許多交通事故的肇因便是駕
駛或行人因滑手機未專心移動而發生。
這篇研究首先探討行動網路常見的攻擊手段,之後我們提出一個攻擊手
機行動網路的惡意軟體目的造成戶外手機使用者使用網路的困難。未後我
們會分析這個軟體在台灣的使用環境以及可以採取的發布方法。
abstract
Along with the progress of network and development of smartphones, our
life have been greatly facilitated. We can almost surf the internet anywhere,
any-time. However, these might also cause crisis that we pay less attention
on things happened around us. In recent years traffic-related death rate
had rise around the world, a part of this result is because of the popularity
of smartphones.
In this thesis we first introduce mobile networks and some common attacks
in it, then we propose a malware for mobile networks to make difficulties
for people using smartphones outdoor. In the end we discuss the
circumstance to run this malware.
ii
Contents
1 Introduction 1
1.1 Introduction to Mobile Networks . . . . . . . . . . . . . . . . . . . 1
1.2 Introduction to Some Common Attacks on Networks . . . . . . . . 2
1.2.1 Passive Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.2 Active Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Motivation and purpose . . . . . . . . . . . . . . . . . . . . . . . . 3
1.4 Organization of This Thesis . . . . . . . . . . . . . . . . . . . . . . 4
2 Related works 5
2.1 Exploiting vulnerabilities in GSM network components due to paging 5
2.2 Botnets in 4G Cellular Networks . . . . . . . . . . . . . . . . . . . 6
2.3 A Chain Reaction DoS Attack on 3G Networks . . . . . . . . . . . 6
3 Model and Methodology 8
4 Analysis 10
5 Conclusions and Future work 12
Reference 13
References
[1] J. Zander; K-W Sung; B. Slimane. (2016), “Fundamentals of Mobile Data
Networks”. Cambridge University Press, ISBN 1107143217.
[2] Murat Oğul and Selçuk Baktır. (2013), “Practical Attacks on Mobile Cellular
Networks and Possible Countermeasures ”. ISSN, 1999-5903.
[3] Masood Khosroshahy, Dongyu Qiu, and Mustafa K. Mehmet Ali.
(2013), “Botnets in 4G Cellular Networks: Platforms toLaunch DDoS
Attacks Against the Air Interface”. International Conference on Selected
Topics in Mobile and Wireless Networking (MoWNeT), DOI:
10.1109/MoWNet.2013.6613793 .
[4] Preimesberger, Chris. (2014), “DDoS Attack Volume Escalates as New Methods
Emerge”. eWeek. May 28, 2014.
[5] Prince, Matthew. (2016), “Empty DDoS Threats: Meet the Armada Collective”.
CloudFlare, Retrieved 18 May 2016.
[6] Yung-Hsuan Chao. (2008), “The Study of Anonymous Secure Routing Protocol
for Mobile Ad Hoc Networks”. NTHU.
[7] Gabrielle Kratsas. (2014), “Cellphone use causes over 1 in 4 car accidents”.
USATODAY.
[8] Stephen Northcutt , “Security Laboratory: Methods of Attack Series”. SANS
technology institute.
[9] Kahn, David. (1974), “The Codebreakers: The Story of Secret Writing”.
Macmillan, ISBN 0-02-560460-0.
[10] Ricciato, F., Coluccia, A., D’Alconzo A., The Codebreakers: “A review of
DoS attack models for 3G cellular networks from a system-design perspective”
Comput. Commun, 2010, 33, 551–558.
[11] Wu, Z., Zhou, X., Yang, F. (2010), “Defending against DoS Attacks on 3G
Cellular Networks via Randomization Method”. In Proceedings of the 2010International Conference on Educational and Information Technology (ICEIT
2010), Chongqing, China, 17–19 September 2010.
[12] Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.. (2009), “A Chain Reaction DoS
Attack on 3G Networks: Analysis and Defenses”. the 28th IEEE International
Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro,
Brazil, 19–25 April 2009.
[13] P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel,and T. La
Porta 2009, “On cellular botnets: measuring the impact ofmalicious devices
on a cellular network core”. Proc. 16thACM conference on Computer and
communications security, NY, USA: ACM, 2009, pp. 223–234.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *