透過您的圖書館登入
IP:3.21.158.148
  • 學位論文

Android上的入侵偵測系統

Porting Snort on Android

指導教授 : 曾文貴

摘要


當手機的功能變得越來越強大,並且在結合了WIFI上網功能之後,我們該如何確保手機的安全性?我們或多或少都會在手機裡面儲存一些重要資訊,舉凡:通訊錄,簡訊內容,用手機拍下的照片,其重要性不亞於電腦中的各種檔案,或者可說是更敏感的個人資料。Android系統是由Linux系統當作基礎,並且加上JAVA framework所構成,目前Android被廣泛地使用在手機上並且當作一個作業系統,Android上的安全性還沒有辦法完全被確保,所以我們將Snort,一個Linux平台上相當熱門的入侵偵測系統,移植到Android手機中,並利用Snort的強大功能封包檢查功能以確保手機在上網時的安全。

並列摘要


When the cell phone becomes more and more sophisticated, and the wireless network has been integrated with the cell phone network, how do we ensure that the cell phone has the security features? In Android, an open source embedded system developed by Google, although by its Linux-based design, there are not that many attacks exist, but sooner or later, the virus, the Trojan horse, or even worms will be developed for the Android platform. Back to the basic point of view, how can we ensure the security when we are surfing on the internet? The most trivial and important way to ensure the security is to scan the packets that flow in our cell phone. We present Snort, a popular intrusion detection system, on Android platform and with its powerful ability, we can detect that if there are malicious contents in the packet flow.

並列關鍵字

Google Android Cross-compilation Snort IDS

參考文獻


[2] Leonid Batyuk, Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Ahmet Ahmet Camtepe, Sahin Albayrak: Developing and Benchmarking Native Linux Applications on Android. MOBILWARE 2009:381-392
[5] D. Samfat and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks, "IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1373-1380, Sep. 1997.
[6] M. Miettinen, P. Halonen, and K. Kimmo H"{a}t"{o}nen, "Host-Based Intrusion Detection for Advanced Mobile Devices," in AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 2 (AINA'06). Washington, DC, USA: IEEE Computer Society, 2006, pp. 72-76.
[8] Dorothy E. Denning: An Intrusion-Detection Model. IEEE Trans. Software Eng. (TSE) 13(2):222-232 (1987)
[9] Uwe Aickelin, Jamie Twycross, Thomas Hesketh-Roberts: Rule Generalisation in Intrusion Detection Systems using Snort CoRR abs/0803.2973 (2008)

延伸閱讀


國際替代計量