簡易檢索 / 詳目顯示

研究生: 吳品曄
Wu, Pin Yeh
論文名稱: 利用分散式阻斷服務攻擊手機行動網路的惡意程式
An Android Malware for Mobile Networks Using Distributed Denial of Service Attacks
指導教授: 孫宏民
Sun, Hung Min
口試委員: 林宸堂
Lin, Chen Tang
黃育綸
Huang, Yu Lun
吳育松
Wu, Yu Sung
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 14
中文關鍵詞: 行動網路分散式阻斷服務攻擊惡意程式網際網路協定位址
外文關鍵詞: mobile networks, Distributed Denial of Service attack, malware, Internet Protocol Address
相關次數: 點閱:2下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 摘要
    智慧型手機與網路的發達為我們的生活帶來了許多便利,也大大的改變
    了我們的生活習慣。然而,在我們能夠隨時隨地上網的同時卻也可能因為
    對周遭環境的不注意而引發潛在危機。近幾年許多交通事故的肇因便是駕
    駛或行人因滑手機未專心移動而發生。
    這篇研究首先探討行動網路常見的攻擊手段,之後我們提出一個攻擊手
    機行動網路的惡意軟體目的造成戶外手機使用者使用網路的困難。未後我
    們會分析這個軟體在台灣的使用環境以及可以採取的發布方法。


    abstract
    Along with the progress of network and development of smartphones, our
    life have been greatly facilitated. We can almost surf the internet anywhere,
    any-time. However, these might also cause crisis that we pay less attention
    on things happened around us. In recent years traffic-related death rate
    had rise around the world, a part of this result is because of the popularity
    of smartphones.
    In this thesis we first introduce mobile networks and some common attacks
    in it, then we propose a malware for mobile networks to make difficulties
    for people using smartphones outdoor. In the end we discuss the
    circumstance to run this malware.
    ii

    Contents 1 Introduction 1 1.1 Introduction to Mobile Networks . . . . . . . . . . . . . . . . . . . 1 1.2 Introduction to Some Common Attacks on Networks . . . . . . . . 2 1.2.1 Passive Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.2 Active Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Motivation and purpose . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Organization of This Thesis . . . . . . . . . . . . . . . . . . . . . . 4 2 Related works 5 2.1 Exploiting vulnerabilities in GSM network components due to paging 5 2.2 Botnets in 4G Cellular Networks . . . . . . . . . . . . . . . . . . . 6 2.3 A Chain Reaction DoS Attack on 3G Networks . . . . . . . . . . . 6 3 Model and Methodology 8 4 Analysis 10 5 Conclusions and Future work 12 Reference 13

    References
    [1] J. Zander; K-W Sung; B. Slimane. (2016), “Fundamentals of Mobile Data
    Networks”. Cambridge University Press, ISBN 1107143217.
    [2] Murat Oğul and Selçuk Baktır. (2013), “Practical Attacks on Mobile Cellular
    Networks and Possible Countermeasures ”. ISSN, 1999-5903.
    [3] Masood Khosroshahy, Dongyu Qiu, and Mustafa K. Mehmet Ali.
    (2013), “Botnets in 4G Cellular Networks: Platforms toLaunch DDoS
    Attacks Against the Air Interface”. International Conference on Selected
    Topics in Mobile and Wireless Networking (MoWNeT), DOI:
    10.1109/MoWNet.2013.6613793 .
    [4] Preimesberger, Chris. (2014), “DDoS Attack Volume Escalates as New Methods
    Emerge”. eWeek. May 28, 2014.
    [5] Prince, Matthew. (2016), “Empty DDoS Threats: Meet the Armada Collective”.
    CloudFlare, Retrieved 18 May 2016.
    [6] Yung-Hsuan Chao. (2008), “The Study of Anonymous Secure Routing Protocol
    for Mobile Ad Hoc Networks”. NTHU.
    [7] Gabrielle Kratsas. (2014), “Cellphone use causes over 1 in 4 car accidents”.
    USATODAY.
    [8] Stephen Northcutt , “Security Laboratory: Methods of Attack Series”. SANS
    technology institute.
    [9] Kahn, David. (1974), “The Codebreakers: The Story of Secret Writing”.
    Macmillan, ISBN 0-02-560460-0.
    [10] Ricciato, F., Coluccia, A., D’Alconzo A., The Codebreakers: “A review of
    DoS attack models for 3G cellular networks from a system-design perspective”
    Comput. Commun, 2010, 33, 551–558.
    [11] Wu, Z., Zhou, X., Yang, F. (2010), “Defending against DoS Attacks on 3G
    Cellular Networks via Randomization Method”. In Proceedings of the 2010International Conference on Educational and Information Technology (ICEIT
    2010), Chongqing, China, 17–19 September 2010.
    [12] Zhao, B., Chi, C., Gao, W., Zhu, S., Cao, G.. (2009), “A Chain Reaction DoS
    Attack on 3G Networks: Analysis and Defenses”. the 28th IEEE International
    Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro,
    Brazil, 19–25 April 2009.
    [13] P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel,and T. La
    Porta 2009, “On cellular botnets: measuring the impact ofmalicious devices
    on a cellular network core”. Proc. 16thACM conference on Computer and
    communications security, NY, USA: ACM, 2009, pp. 223–234.

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)

    QR CODE