透過您的圖書館登入
IP:3.142.250.114
  • 學位論文

Android上的殭屍網路攻擊偵測

Mobile Botnet Detection on Android

指導教授 : 曾文貴

摘要


殭屍網路是現今網路上一大嚴重威脅,感染到殭屍病毒的電腦會不自覺地成為被控制的傀儡,不僅造成資料外洩、系統損壞、甚至成為重大網路攻擊的跳板。隨著智慧型手機的高度發展下,手機所提供的功能不只是傳統通電話或是傳簡訊 ,還包含了上網以及基本資料處理的功能,許多個人的資料、密碼還有相關私密的圖片、影片都會存放在手機裡,手機儼然成為一個小型PC,因此近年來許多駭客不斷發展手機上的病毒、木馬、殭屍網路等惡意軟體,去竊取手機隱私資料、發送廣告簡訊和垃圾郵件等等。因此本論文提供一個針對Android手機上的殭屍網路偵測系統,在手機的流量中,根據殭屍網路的group activity特質和異常連線,於手機前端使用Snort這款強大的IDS做即時偵測,並安裝收集殭屍網路異常封包的filter,將過濾好的封包上傳到後端的偵測中心,偵測中心從眾多手機的資料中,使用相似度演算法去判斷哪些手機是感染到殭屍病毒且正遭受惡意控制。

關鍵字

殭屍網路

並列摘要


Botnets are now a serious threat to the internet . The infected computers will become a puppet (zombie computer), and controlled by attacker unconsciously . This impact not only resulted in leakage of information, system damage , but also make the computers become a springboard for a major network attacks .With the high development of smart phones , the phone is not just for calling or sending messages like before , also contains the ability of surfing the internet and basic processing data ; hence many personal data , passwords , private pictures/videos are stored in the phone. The smart phone has become a mini-PC. So in recent years , many hackers continue to develop viruses , Trojan Horses , bot virus and other malicious software on mobile phones to steal private information , send advertising messages and spam e-mails. Therefore in this paper , we provide a mobile Botnet detection system on Android. Based on the group activities model and abnormal connections metric , installing the Snort IDS to detect real time traffic and the Botnet packet filter to collect abnormal traffic in the frontend. Then upload the abnormal traffic to the detection center . After collecting traffic data from many mobile phones , the center uses similarity algorithms to determine which phone is infected with the bot virus and controlled by attacker.

並列關鍵字

Mobile Botnet Android

參考文獻


[36] S. Gianvecchio, M. Xie, Z. Wu, and H. Wang, “Measurement and Classification of Humans and Bots in Internet Chat”. Proceedings of the 17th conference on Security symposium, CA, USA. 2008.
[17] Jih-Hong Lo , Wen-Guey Tzeng,“ Porting Snort on Android ”,NCTU ,ROC , June ,2010
[30] J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In The 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI ’06), 2006.
[27] H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic," in Proc. 7th IEEE International Conference on Computer and Information Technology(CIT 2007), 2007,pp.715-720.
[5] Eclipse Integrated Development Environment , http://www.eclipse.org/

被引用紀錄


孫建興(2012)。行動裝置上惡意軟體行為偵測之研究-以Android為例〔碩士論文,大同大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0081-3001201315113570
黃裕仁(2017)。預測試管嬰兒成功率-使用隨機森林、RIPPER及決策樹資料探勘演算法〔碩士論文,國立虎尾科技大學〕。華藝線上圖書館。https://www.airitilibrary.com/Article/Detail?DocID=U0028-2906201722334000

延伸閱讀