| 研究生: |
吳駿劭 Jyun-Shao Wu |
|---|---|
| 論文名稱: | IoTD:An SMTP-Based Approach to Identify IoT Devices |
| 指導教授: | 許富皓 |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
資訊電機學院 - 資訊工程學系 Department of Computer Science & Information Engineering |
| 論文出版年: | 2018 |
| 畢業學年度: | 106 |
| 語文別: | 英文 |
| 論文頁數: | 41 |
| 中文關鍵詞: | 物聯網 、垃圾郵件 、電子郵件 、防禦 、偵測 |
| 外文關鍵詞: | SMTP |
| 相關次數: | 點閱:14 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,如何去防範網路攻擊是一直是被研究的領域,攻擊者會在進行攻擊時隱藏自己,讓防禦者或是調查人員無法掌握背後的攻擊者。其中,物聯網 (Internet of Things) 設備將越來越多,其所產生的安全問題也隨之一一浮上檯面。像是針對物聯網設備進行攻擊的惡意程式 Mirai,抑或是針對預設密碼的網路攝影機的攻擊等等,都已慢慢侵害到一般人的隱私或是進而造成危害。其中造成世界危害的攻擊包含影響網路狀況的 DDoS 攻擊、垃圾郵件散布、漏洞挖掘、使用者隱私洩露等等,這些攻擊將會因物聯網設備的增加而更難防禦。然而,對於物聯網設備的偵測與防禦還正處在萌芽階段,在本篇論文當中,將從垃圾郵件的角度來提出一個 IoTD 的方法,用於偵測寄送信件的寄信人是否為一台物聯網設備,進而有效利用此資訊在未來的安全研究領域之中,讓物聯網的安全性問題能更進一步的有所斬獲。
In recent years, how to prevent cyber attacks has always been in the field of research. Attackers will hide when they are attacking so that defenders or investigators cannot grasp the attackers behind them. Among them, the security problems of the increment of the Internet of Things (IoT) will come to the forefront. Mirai, a malware attacking IoT devices, and the problem on a network camera with default password issue, harm and leak the privacy of innocent people. The attacks cause harm to the world such as DDoS attacks that affect network bandwidth, email spam, vulnerability mining, user privacy leaks, and etc. These attacks will be more difficult to defend due to the increase in IoT devices. However, the detection and defense of IoT devices are still in its infancy. In this paper, an IoTD method will be proposed from the perspective of spam to detect whether a sender of the mail is an IoT device, and thus effectively use this information in security research field in the future.
[1] Gartner, “Gartner Says 4.9 Billion Connected ‘Things’Will Be in Use in 2015,”2014,
http://www.gartner.com/newsroom/id/2905717.
[2] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An Experimental
Study of Security and Privacy Risks with Emerging Household Appliances,”in Proc.
International Workshop on Security and Privacy in Machine-to-Machine Communications
(M2MSec), Oct 2014.
[3] S. Grover and N. Feamster,“The Internet of Unpatched Things,”in Proc. FTC PrivacyCon,
Jan 2016.
[4]“Your Fridge is Full of SPAM: Proof of An IoT-driven Attack,”Jan 2014,
https://www.proofpoint.com/us/threat-insight/post/Your-Fridgeis-
Full-of-SPAM. (Accessed on 5/2/2018)
[5] Justin M. Rao and David H. Reiley, “The Economics of Spam,”Journal of Economic
PerspectivesVolume 26, Number 3Summer 2012Pages 87–110, 2012.
[6] M3AAWG,“Email metrics report,”Nov 2014, https://www.m3aawg.org/for-theindustry/
email-metrics-report. (Accessed on 4/17/2018)
[7] Nadezhda Demidova, Tatyana Shcherbakova, Maria Vergelis, “Spam and phishing in
Q1 2018”, 2018, https://securelist.com/spam-and-phishing-in-q1-2018/
85650/. (Accessed on 4/26/2018)
[8] RFC 3207, SMTP Service Extension for Secure SMTP over Transport Layer Security, 2002.
[9] RFC 7598, Deprecating Secure Sockets Layer Version 3.0, 2015.
[10] Adam Langley, “Disabling SSLv3 and RC4,”Google Security Blog, 2015, https://
security.googleblog.com/2015/09/disabling-sslv3-and-rc4.html.
[11]“The Transport Layer Security (TLS) Protocol Version 1.3,”2018, https://tools.ietf.
org/html/draft-ietf-tls-tls13-28.
[12] Kuo, Fang-Chun and Tschofenig, Hannes and Meyer, Fabian and Fu, Xiaoming,
“Comparison studies between pre-shared key and public key exchange mechanisms for transport
layer security (TLS),”Institute for Informatics, University of Goettingen, Technical
Report IFI-TB-2006-01, 2006
[13] Vincent Berna,“TLS and Perfect Forward Secrecy,”2011, https://vincent.bernat.
im/en/blog/2011-ssl-perfect-forward-secrecy.
[14] Zhao, Li and Iyer, Ravi and Makineni, Srihari and Bhuyan, Laxmi, “Anatomy and Performance
of SSL Processing”, IEEE International Symposium on, page 197-206,” 2005.
[15] Postfix, http://www.postfix.org/
[16] Binu Ramakrishnan, “Measuring SMTP STARTTLS Deployment Quality,” 2015,
https://yahoo-security.tumblr.com/post/141495385400/measuringsmtp-
starttls-deployment-quality
[17] Facebook, “The Current State of SMTP STARTTLS Deployment,”2014,
https://www.facebook.com/notes/protect-the-graph/the-currentstate-
of-smtp-starttls-deployment/1453015901605223/.
[18] Incenp.org,“SMTP-over-TLS usage stats,”2017, https://incenp.org/notes/2017/
smtp-starttls-usage.html.
[19] Meidan, Yair et al., “Detection of Unauthorized IoT Devices Using Machine Learning
Techniques,”arXiv preprint arXiv:1709.04647, 2017.
[20] J. Pang et al., “802.11 user fingerprinting,”in Proceedings of the 13th Annual ACM International
Conference on Mobile Computing and Networking, ser. MobiCom ’07. ACM,
2007, pp. 99–110.
[21] R. Tomsˇu˚ et al.,“Profiling users by modeling web transactions,”in IEEE International
Conference on Distributed Computing Systems, 2017
[22] Bruhadeshwar