研究生: |
吳品曄 Wu, Pin Yeh |
---|---|
論文名稱: |
利用分散式阻斷服務攻擊手機行動網路的惡意程式 An Android Malware for Mobile Networks Using Distributed Denial of Service Attacks |
指導教授: |
孫宏民
Sun, Hung Min |
口試委員: |
林宸堂
Lin, Chen Tang 黃育綸 Huang, Yu Lun 吳育松 Wu, Yu Sung |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 英文 |
論文頁數: | 14 |
中文關鍵詞: | 行動網路 、分散式阻斷服務攻擊 、惡意程式 、網際網路協定位址 |
外文關鍵詞: | mobile networks, Distributed Denial of Service attack, malware, Internet Protocol Address |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
摘要
智慧型手機與網路的發達為我們的生活帶來了許多便利,也大大的改變
了我們的生活習慣。然而,在我們能夠隨時隨地上網的同時卻也可能因為
對周遭環境的不注意而引發潛在危機。近幾年許多交通事故的肇因便是駕
駛或行人因滑手機未專心移動而發生。
這篇研究首先探討行動網路常見的攻擊手段,之後我們提出一個攻擊手
機行動網路的惡意軟體目的造成戶外手機使用者使用網路的困難。未後我
們會分析這個軟體在台灣的使用環境以及可以採取的發布方法。
abstract
Along with the progress of network and development of smartphones, our
life have been greatly facilitated. We can almost surf the internet anywhere,
any-time. However, these might also cause crisis that we pay less attention
on things happened around us. In recent years traffic-related death rate
had rise around the world, a part of this result is because of the popularity
of smartphones.
In this thesis we first introduce mobile networks and some common attacks
in it, then we propose a malware for mobile networks to make difficulties
for people using smartphones outdoor. In the end we discuss the
circumstance to run this malware.
ii
References
[1] J. Zander; K-W Sung; B. Slimane. (2016), “Fundamentals of Mobile Data
Networks”. Cambridge University Press, ISBN 1107143217.
[2] Murat Oğul and Selçuk Baktır. (2013), “Practical Attacks on Mobile Cellular
Networks and Possible Countermeasures ”. ISSN, 1999-5903.
[3] Masood Khosroshahy, Dongyu Qiu, and Mustafa K. Mehmet Ali.
(2013), “Botnets in 4G Cellular Networks: Platforms toLaunch DDoS
Attacks Against the Air Interface”. International Conference on Selected
Topics in Mobile and Wireless Networking (MoWNeT), DOI:
10.1109/MoWNet.2013.6613793 .
[4] Preimesberger, Chris. (2014), “DDoS Attack Volume Escalates as New Methods
Emerge”. eWeek. May 28, 2014.
[5] Prince, Matthew. (2016), “Empty DDoS Threats: Meet the Armada Collective”.
CloudFlare, Retrieved 18 May 2016.
[6] Yung-Hsuan Chao. (2008), “The Study of Anonymous Secure Routing Protocol
for Mobile Ad Hoc Networks”. NTHU.
[7] Gabrielle Kratsas. (2014), “Cellphone use causes over 1 in 4 car accidents”.
USATODAY.
[8] Stephen Northcutt , “Security Laboratory: Methods of Attack Series”. SANS
technology institute.
[9] Kahn, David. (1974), “The Codebreakers: The Story of Secret Writing”.
Macmillan, ISBN 0-02-560460-0.
[10] Ricciato, F., Coluccia, A., D’Alconzo A., The Codebreakers: “A review of
DoS attack models for 3G cellular networks from a system-design perspective”
Comput. Commun, 2010, 33, 551–558.
[11] Wu, Z., Zhou, X., Yang, F. (2010), “Defending against DoS Attacks on 3G
Cellular Networks via Randomization Method”. In Proceedings of the 2010International Conference on Educational and Information Technology (ICEIT
2010), Chongqing, China, 17–19 September 2010.
[12] Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.. (2009), “A Chain Reaction DoS
Attack on 3G Networks: Analysis and Defenses”. the 28th IEEE International
Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro,
Brazil, 19–25 April 2009.
[13] P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel,and T. La
Porta 2009, “On cellular botnets: measuring the impact ofmalicious devices
on a cellular network core”. Proc. 16thACM conference on Computer and
communications security, NY, USA: ACM, 2009, pp. 223–234.