:::

詳目顯示

回上一頁
題名:網路誘捕系統之動態部署決策模式
書刊名:管理與系統
作者:王平 引用關係羅濟群 引用關係
作者(外文):Wang, PingLo, Chi-chun
出版日期:2009
卷期:16:2
頁次:頁285-309
主題關鍵詞:誘捕系統網路安全最佳部署佈雷區HoneypotNetwork securityOptimal DeploymentMinefield
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(0) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:0
  • 共同引用共同引用:0
  • 點閱點閱:19
近年來,資安組織成功運用入侵偵測系統(Intrusion Detection System, IDS),針對可疑的攻擊將其連線轉移至誘捕系統(honeypot),進行駭客或病毒的行爲觀察與分析,再將分析結果對所控管網路管理者發出警告,提供網路更堅實的保護。目前誘捕系統部署常運用「佈雷區」(minefield)的策略,透過欺敵技術,將它們散佈網路上,以誘捕駭客;但常發現資訊蒐集的效果不彰,即使部署完成,常無法吸引攻擊者前來探測,造成誘捕系統形同虛設,故如何有效選擇部署節點,以期在最短時間內蒐集最多的網路攻擊資訊,並降低被駭客反偵測的可能性,是研究誘捕系統部署決策的重要議題。本研究運用機率與網路路徑分析技術,建立一個誘捕系統的動態部署分析數學模式,改進現有靜態佈雷區策略的缺失,改善誘捕系統之部署決策品質。面對部署效果不彰的問題,本研究分析在不同等級的網路服務品質(Quality of Service, QoS)限制下,運用最低成本法以分析駭客連線的最佳路徑,進而推估誘捕系統的最佳部署節點,以提高誘捕機率。系統驗證將以NS2(Network Simulator, version2)工具模擬「隨機部署」、「最低成本部署」、「駭客擁有部份誘捕系統資訊下的部署」及「機動部署」等四種策略,由案例分析中,所提的決策模式,可有效協助網路管理者分析通訊網路中的建議部署節點及最佳部署節點。
To effectively provide an early alarm of dangers for attack events, security organizations have successfully employed Intrusion Detection System (IDS) to transfer the suspicious connections to honeypot which can capture and analyze the hacker's behavior and virus signature for years. Using the minefield strategy to deploy honeypot systems, managers place decoy systems and spread them among network nodes to trap hackers. There exists the problem that honeypot constantly cannot appeal the attention of hacker's attack if honeypot is deployed within the inappropriate zone or node. It is a crucial issue that how to effectively deploy it for accumulating large numbers of information as well as decrease the anti-detect possibilities by hackers. Hence, we develop a network-based analysis model for dynamic honeypot deployment through the use of probability theorem and traffic analysis technique to improve the limitations of way of static strategy, promote the decision quality of honeypot deployment. It discovers the best route with the minimum cost, and decides the optimal deployment node to increase the trap possibility within distinct QoS constraints. Using NS2, this model is validated by four network deployment strategies, that is, minimum-cost deployment, random deployment, Bayes-based deployment and dynamic deployment, to test its efficiency. The experimental results show that the proposed approach can effectively locate the recommended nodes and the optimal node of honeypot deployment in a communication network.
期刊論文
1.Cohen, F.(2000)。A Mathematical Structure of Simple Defensive Network Deception。Computers and Security,Vol. 19, No. 6,520-528。  new window
2.Hernacki B., Bennett J., and Lofgren, T.(2004)。Symantec Deception Server Experience with a Commercial Deception System。Lecture Notes in Computer Science,Vol. 3224,188-202。  new window
會議論文
1.王平、蘇浩儀、顏柏璋、王建仁(2007)。「誘捕系統動態部署模式的建立與分析」。嘉義。661-670。  延伸查詢new window
2.Dornseif, M., Holz, T., and Klein, C. N.(2004)。Nose Break-attacking Honeynets。New York。123-129。  new window
3.Sherif, M. K., Chatree, S., Daniel, M., Rami, M., and Taieb, Z.(2004)。Roaming Honeypots for Mitigating Service-level Denial-of- Service Attacks。Hachioji, Tokyo。328-337。  new window
學位論文
1.黃志雄(2004)。整合代理人入侵偵測系統與陷阱誘捕系統之研究(碩士論文)。國立嘉義大學。  延伸查詢new window
圖書
1.Skvarcius, R. and Robinson, W. B.(1986)。Discrete Mathematics with Computer Science Applications。Menlo Park, CA。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE