跳到主要內容

簡易檢索 / 詳目顯示

研究生: 吳駿劭
Jyun-Shao Wu
論文名稱: IoTD:An SMTP-Based Approach to Identify IoT Devices
指導教授: 許富皓
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 資訊工程學系
Department of Computer Science & Information Engineering
論文出版年: 2018
畢業學年度: 106
語文別: 英文
論文頁數: 41
中文關鍵詞: 物聯網垃圾郵件電子郵件防禦偵測
外文關鍵詞: SMTP
相關次數: 點閱:14下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 近年來,如何去防範網路攻擊是一直是被研究的領域,攻擊者會在進行攻擊時隱藏自己,讓防禦者或是調查人員無法掌握背後的攻擊者。其中,物聯網 (Internet of Things) 設備將越來越多,其所產生的安全問題也隨之一一浮上檯面。像是針對物聯網設備進行攻擊的惡意程式 Mirai,抑或是針對預設密碼的網路攝影機的攻擊等等,都已慢慢侵害到一般人的隱私或是進而造成危害。其中造成世界危害的攻擊包含影響網路狀況的 DDoS 攻擊、垃圾郵件散布、漏洞挖掘、使用者隱私洩露等等,這些攻擊將會因物聯網設備的增加而更難防禦。然而,對於物聯網設備的偵測與防禦還正處在萌芽階段,在本篇論文當中,將從垃圾郵件的角度來提出一個 IoTD 的方法,用於偵測寄送信件的寄信人是否為一台物聯網設備,進而有效利用此資訊在未來的安全研究領域之中,讓物聯網的安全性問題能更進一步的有所斬獲。


    In recent years, how to prevent cyber attacks has always been in the field of research. Attackers will hide when they are attacking so that defenders or investigators cannot grasp the attackers behind them. Among them, the security problems of the increment of the Internet of Things (IoT) will come to the forefront. Mirai, a malware attacking IoT devices, and the problem on a network camera with default password issue, harm and leak the privacy of innocent people. The attacks cause harm to the world such as DDoS attacks that affect network bandwidth, email spam, vulnerability mining, user privacy leaks, and etc. These attacks will be more difficult to defend due to the increase in IoT devices. However, the detection and defense of IoT devices are still in its infancy. In this paper, an IoTD method will be proposed from the perspective of spam to detect whether a sender of the mail is an IoT device, and thus effectively use this information in security research field in the future.

    摘要v Abstract vi 致謝vii Contents viii List of Figures x List of Tables xi 1 Introduction 1 2 Background 4 2.1 E-mail Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.2 SMTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Transport Layer Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Threat Model 11 4 System design 13 4.1 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4.2 System overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 5 Evaluation 18 5.1 System environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 5.2 Result . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 6 Related Work 22 7 Discussion 23 8 Conclusion 24 Reference 25 A Analysis 27

    [1] Gartner, “Gartner Says 4.9 Billion Connected ‘Things’Will Be in Use in 2015,”2014,
    http://www.gartner.com/newsroom/id/2905717.
    [2] S. Notra, M. Siddiqi, H. H. Gharakheili, V. Sivaraman, and R. Boreli, “An Experimental
    Study of Security and Privacy Risks with Emerging Household Appliances,”in Proc.
    International Workshop on Security and Privacy in Machine-to-Machine Communications
    (M2MSec), Oct 2014.
    [3] S. Grover and N. Feamster,“The Internet of Unpatched Things,”in Proc. FTC PrivacyCon,
    Jan 2016.
    [4]“Your Fridge is Full of SPAM: Proof of An IoT-driven Attack,”Jan 2014,
    https://www.proofpoint.com/us/threat-insight/post/Your-Fridgeis-
    Full-of-SPAM. (Accessed on 5/2/2018)
    [5] Justin M. Rao and David H. Reiley, “The Economics of Spam,”Journal of Economic
    Perspectives􀃾Volume 26, Number 3􀃾Summer 2012􀃾Pages 87–110, 2012.
    [6] M3AAWG,“Email metrics report,”Nov 2014, https://www.m3aawg.org/for-theindustry/
    email-metrics-report. (Accessed on 4/17/2018)
    [7] Nadezhda Demidova, Tatyana Shcherbakova, Maria Vergelis, “Spam and phishing in
    Q1 2018”, 2018, https://securelist.com/spam-and-phishing-in-q1-2018/
    85650/. (Accessed on 4/26/2018)
    [8] RFC 3207, SMTP Service Extension for Secure SMTP over Transport Layer Security, 2002.
    [9] RFC 7598, Deprecating Secure Sockets Layer Version 3.0, 2015.
    [10] Adam Langley, “Disabling SSLv3 and RC4,”Google Security Blog, 2015, https://
    security.googleblog.com/2015/09/disabling-sslv3-and-rc4.html.
    [11]“The Transport Layer Security (TLS) Protocol Version 1.3,”2018, https://tools.ietf.
    org/html/draft-ietf-tls-tls13-28.
    [12] Kuo, Fang-Chun and Tschofenig, Hannes and Meyer, Fabian and Fu, Xiaoming,
    “Comparison studies between pre-shared key and public key exchange mechanisms for transport
    layer security (TLS),”Institute for Informatics, University of Goettingen, Technical
    Report IFI-TB-2006-01, 2006
    [13] Vincent Berna,“TLS and Perfect Forward Secrecy,”2011, https://vincent.bernat.
    im/en/blog/2011-ssl-perfect-forward-secrecy.
    [14] Zhao, Li and Iyer, Ravi and Makineni, Srihari and Bhuyan, Laxmi, “Anatomy and Performance
    of SSL Processing”, IEEE International Symposium on, page 197-206,” 2005.
    [15] Postfix, http://www.postfix.org/
    [16] Binu Ramakrishnan, “Measuring SMTP STARTTLS Deployment Quality,” 2015,
    https://yahoo-security.tumblr.com/post/141495385400/measuringsmtp-
    starttls-deployment-quality
    [17] Facebook, “The Current State of SMTP STARTTLS Deployment,”2014,
    https://www.facebook.com/notes/protect-the-graph/the-currentstate-
    of-smtp-starttls-deployment/1453015901605223/.
    [18] Incenp.org,“SMTP-over-TLS usage stats,”2017, https://incenp.org/notes/2017/
    smtp-starttls-usage.html.
    [19] Meidan, Yair et al., “Detection of Unauthorized IoT Devices Using Machine Learning
    Techniques,”arXiv preprint arXiv:1709.04647, 2017.
    [20] J. Pang et al., “802.11 user fingerprinting,”in Proceedings of the 13th Annual ACM International
    Conference on Mobile Computing and Networking, ser. MobiCom ’07. ACM,
    2007, pp. 99–110.
    [21] R. Tomsˇu˚ et al.,“Profiling users by modeling web transactions,”in IEEE International
    Conference on Distributed Computing Systems, 2017
    [22] Bruhadeshwar

    QR CODE
    :::