跳到主要內容

簡易檢索 / 詳目顯示

研究生: 歐書甫
Shu-Fu Ou
論文名稱: 車載網路上基於狀態判斷之共謀攻擊偵測機制
State-based Collusion Attack Detection Mechanism for Vehicular Ad Hoc Networks
指導教授: 陳奕明
Yi-Ming Chen
口試委員:
學位類別: 碩士
Master
系所名稱: 管理學院 - 資訊管理學系
Department of Information Management
畢業學年度: 99
語文別: 中文
論文頁數: 48
中文關鍵詞: 攻擊偵測共謀攻擊車載網路假訊息攻擊
外文關鍵詞: bogus information attack, attack detection, collusion attack, VANETs
相關次數: 點閱:6下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在現今網路發達的社會中,惡意者相互串聯發動的共謀攻擊是一種常見的攻擊方法。在車載網路這個新興的領域中,也必須考慮發生共謀攻擊的可能並探討其偵測方法。
    在過去關於假訊息攻擊的研究中,很少有人討論到共謀攻擊。本研究從共謀的角度出發,依據過去文獻上對不同情境上的共謀攻擊討論,定義出車載網路中的共謀假訊息攻擊,然後利用簡單的循序圖分析車輛在警訊應用服務上的行為,從中發現應用服務中的系統狀態可以使用於偵測攻擊者。我們結合車載網路的地理與時間資源限制以及應用程式執行狀態,設計出基於狀態判斷之共謀偵測機制,將其應用於偵測車載網路中的共謀假訊息攻擊上。
    本研究依照所提出之警訊應用服務進行模擬實驗,在環境中有共謀群體串聯發送假訊息,比較本研究與多數決機制的假訊息比例與誤判比例,本研究提出的方法可減少的假訊息與多數決機制相比約達20%,而誤判比例也少於多數決3%至5%。


    In modern world of developed networks, it is a common way of attack that malicious users collude with each other. In the new developing area of vehicular ad hoc networks, we should take collusion attack into account as well.
    In the past researches about bogus message attack, there are few think about collusion. In this paper, we start from the thought of collusion. By defining the collusion bogus message attack in VANETs according to collusion attacks of different scenarios in the past and with using a simple way to analyze the actions of danger warning application service on vehicles via sequence diagram, we found that the system state of application system could be used in detecting attacker. We combine the restrain of graphical and time resource and the execution state of application service to design a state-based collusion attack detection mechanism. We also exploit the mechanism to detect collusion bogus message attack in VANETs.
    We do simulation experiments about the proposed danger warning application service. Collusion groups collude to send bogus messages in the experimental environment. The percentage of bogus message and false negative rate will be compared between majority voting mechanism and our mechanism. The results show that our proposed mechanism can successfully suppress the number of false message by 20%, and lessen the false positive rate by 3% to 5%.

    中文摘要.......................................... i 英文摘要.......................................... ii 圖目錄............................................ vi 表目錄............................................ vii 一、 緒論...................................... 1 1-1研究背景....................................... 1 1-2研究動機與目的................................. 4 1-3研究貢獻....................................... 6 1-4章節架構....................................... 7 二、 相關研究.................................. 8 2-1各領域的共謀攻擊與定義......................... 8 2-1-1 廣義與實體社會中的共謀攻擊.................. 8 2-1-2 資訊系統中的共謀攻擊........................ 9 2-2車載網路中的決策與偵測機制..................... 14 三、 基於狀態判斷的共謀攻擊偵測機制............ 18 3-1車載網路道路警訊應用服務....................... 18 3-2攻擊模型....................................... 20 3-3基於狀態判斷的共謀偵測機制..................... 21 四、 模擬實驗與結果討論........................ 29 4-1使用工具....................................... 29 4-2實驗結果....................................... 31 4-2-1 攻擊情境1實驗結果 – 攻擊者發布之假事件所附事件地點於其觀察範圍外...................................... 33 4-2-2 攻擊情境2 實驗結果– 攻擊者發布之假事件所附事件地點於其觀察範圍內...................................... 36 4-2-3 攻擊情境3實驗結果 – 多群共謀群體........... 37 4-3小結........................................... 39 五、 結論與未來研究............................ 41 5-1研究結論與貢獻................................. 41 5-2研究限制....................................... 42 5-3未來研究....................................... 43 六、 參考文獻.................................. 45

    中文文獻
    [1] 交通部統計處,中華民國交通統計月報,http://www.motc.gov.tw/mocwebGIP/wSite/ct?xItem=4880&ctNode=167&mp=1,民國100年。
    [2] 鄭義穎,結合社會網路分析與網絡結構探勘偵測網路拍賣哄抬評價之共犯群體,國立中央大學資訊管理所碩士論文,民國 99 年。
    [3] 黃建勳,應用社會網路之信任概念於車載網路上存取控制之研究,國立中央大學資訊管理所碩士論文,民國 99 年。
    [4] 柯志亨、林政翰、梁浩銘、余佳育、高谷蘭,計算機網路實驗─使用 NS2 模擬多媒體通訊與無線網路,學貫出版,民國 96 年。
    英文文獻
    [5] World Health Organization Department of Violence & Injury Prevention & Disability (VIP), “Global status report on road safety,” http://www.who.int/violence_injury_prevention/road_safety_status/2009/en/index.html, 2009.
    [6] P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung and J. Hubaux, “Secure Vehicular Communication Systems: Design and Architecture,” IEEE Communications Magazine, 2008, pp. 100 – 109.
    [7] T.L. Willke, P. Tientrakool and N.F. Maxemchuk, “A survey of inter-vehicle communication protocols and their applications,” IEEE Communications Surveys & Tutorials, 2009, pp. 3–20.
    [8] T. Moore, “Cooperative attack and defense in distributed networks,” University of Cambridge, 2008.
    [9] M. Raya, J. Hubaux, “Securing vehicular ad hoc networks,” Journal of Computer Security, 2007, pp.39–68.
    [10] K. Sampigethaya, M. Li, L. Huang and, R. Poovendran, “AMOEBA: Robust Location Privacy Scheme for VANET,” IEEE Journal on Selected Areas in Communications, 2007, pp. 1569–1589.
    [11] U. F. Minhas, J. Zhang, T. Tran and R. Cohen, “A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks,” IEEE Transactions on Systems, Man, and Cybernetics--Part C: Applications and Reviews, 2009, pp. 1–14.
    [12] M. Raya, P. Papadimitratos, D. Gligor and J. Hubaux, “On Data Centric Trust Establishment in Ephemeral Ad Hoc Networks,” IEEE INFOCOM, 2008, pp. 1238–1246.
    [13] B. Ostermaier, F. D‥otzer and M. Strassberger, “Enhancing the Security of Local Danger Warnings in VANETs - A Simulative Analysis of Voting Schemes,” In Proceedings of the The Second International Conference on Availability, Reliability and Security, 2007, pp. 422–431.
    [14] G. Philippe, G. Dan and S. Jessica, “Detecting and Correcting Malicious Data in VANETs,” ACM international workshop on Vehicular ad hoc networks, 2004, pp. 29–37.
    [15] T. H.-J. Kim, A. Studer, R. Dubey, X. Zhang, A. Perrig, F. Bai, B. Bellur and A. Iyer, “VANET Alert Endorsement Using Multi-Source Filters,” ACM international workshop on VehiculAr InterNETworking, 2010, pp. 51–60.
    [16] J. Zhang, “A Survey on Trust Management for VANETs,” International Conference on Advanced Information Networking and Applications, 2011, pp. 105-112.
    [17] S. Braynov and M. Jadliwala, “Representation and analysis of coordinated attacks,” ACM workshop on Formal methods in security engineering, 2003, pp. 43-51.
    [18] J.K. Lou, K.T. Chen and C.L. Lei, “A Collusion-Resistant Automation Scheme for Social Moderation Systems,” In Proceedings of IEEE Consumer Communications and Networking Conference, 2009, pp. 1–5.
    [19] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato and A. Jamalipour, “A Survey Of Routing Attacks In Mobile Ad Hoc Networks,” IEEE Wireless Communications, 2007, pp. 85–91.
    [20] B. Kannhavong, H. Nakayama and A. Jamalipour, “A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks,” IEEE Global Telecommunications Conference, 2006, pp. 1–5.
    [21] B. Qureshi, M. Geyong and D. Kouvatsos, “Collusion Detection and Prevention with FIRE+ Trust and Reputation Model,” IEEE International Conference on Computer and Information Technology, 2010, pp. 2548–2555.
    [22] S. Ozdemir, “Functional reputation based reliable data aggregation and transmission for wireless sensor networks,” The International Journal for the Computer and Telecommunications Industry, 2008, pp. 592–597.
    [23] S. U. Rahman and U. Hengartner, “Secure crash reporting in vehicular Ad hoc networks,” Security and Privacy in Communications Networks and the Workshops, 2007, pp. 443–452.
    [24] C. Chen, J. Zhang ; R. Cohen, P. H. Ho, “A Trust Modeling Framework for Message Propagation and Evaluation in VANETs,” Information Technology Convergence and Services, 2010, pp. 1–8.
    [25] I. Salhi, M.O. Cherif, S.M. Senouci, “A New Architecture for Data Collection in Vehicular Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.
    [26] Karnadi, F. K., Mo, Z. H. and Lan., K-C., “Rapid Generation of Realistic Mobility Models for VANET,” IEEE Wireless Communications and Networking Conference, 2007, pp. 2506–2511.
    [27] X. Zhuo, J. Hao, D. Liu and Y. Dai, “Removal of Misbehaving Insiders in Anonymous VANETs,” ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, 2009, pp. 106–115.
    相關網站
    [28] Dedicated short-range communications, http://en.wikipedia.org/wiki/Dedicated_short-range_communications.
    [29] IEEE 1609 Working Group Public Site, http://vii.path.berkeley.edu/1609_wave/.
    [30] 警政署詐騙排名, http://165.gov.tw/fraud_rank.aspx .
    [31] 線上牛津字典, http://www.oxfordadvancedlearnersdictionary.com/dictionary/ .
    [32] SUMO, http://sumo.sourceforge.net/.
    [33] The Network Simulator – NS-2, http://www.isi.edu/nsnam/ns/ .

    QR CODE
    :::