English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4199945      Online Users : 777
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/3709


    Title: UDIDT下建構於安全機制之入侵追蹤系統
    Other Titles: Intrusion Traceback System on Security Mechanisms under UDIDT
    Authors: 洪嘉鴻
    Hong, Chia-Hong
    Contributors: 呂芳懌
    Leu, Fang-Yie
    東海大學資訊工程學系
    Keywords: 網路安全;入侵偵測;入侵追蹤;識別值;認證
    Network Security;Intrusion Detection;Intrusion Traceback;identification code;authentication
    Date: 2003
    Issue Date: 2011-04-27T06:56:35Z (UTC)
    Abstract: 就目前的網路安全機制而言,例如,Firewall、IDS,對於攻擊者的入侵行為只有警示作用,沒有嚇阻效果。事實上,惟有找到攻擊者,訴諸法律,才能有效地嚇阻攻擊事件的發生。 一個完善的區域防禦機制應該包含入侵偵測與追蹤系統,藉由前者,可偵測出攻擊的行為,再以後者進行追蹤,俾迅速地找到攻擊者,切斷攻擊來源,以保障區域內的網路安全。 在本論文中,將探討區域防禦機制內的入侵追蹤系統。我們所提出的入侵追蹤機制,能適用於目前的網路環境。方法是將龐大的網路環境分為多個網路管理區域,以方便追蹤管理。追蹤系統透過各區域間的相互合作以追蹤攻擊者,而彼此間的追蹤是依據事先記錄在各區域以雜湊函數產生的識別值。 追蹤系統必須架構在一安全的環境上,以免遭受攻擊。本研究是透過CA(Certification Authority)與SSL(Secure Socket Layer)等安全機制,在追蹤系統各單元相互通訊時,保障其身分的識別、傳送的訊息與資料本身的安全性。使整個追蹤機制,能夠快速、正確且安全地找出攻擊者,並保障系統的堅固性,以免遭受攻擊者的破壞而無法正常的運作。
    Currently security mechanisms, such as Firewall, Intrusion Detection System, only focus on caution, prevention and detection. In order to prevent an information system from illegal attacks, finding and punishing malevolent hackers are perhaps the most effective ways. A perfect section defense mechanism should include intrusion detection system and intrusion traceback system. When receiving an alert from intrusion detection system, it can trace the intruder by intrusion traceback system. As an intruder is found, the section defense mechanism will cut off the network connection in order to protect the section. In this paper, we design and construct the intrusion traceback system of the section defense mechanism, which is applicable to current environment of a network system. In this research, we divide a network system into many network management unit (NMU) for tracing intruder and convenient management purpose. Each NMU cooperatively trace the intruder with one another based on the identification code produced by hash function and pre-recorded in each section. Intrusion traceback system needs a secure environment to perform its tracing. CA (Certification Authority) and SSL (Secure Socket Layer) are those mechanisms to guarantee safe authentication and confidentiality in each NMU. Under such an environment, the intruder can be quickly and correctly found. Of course, the system will be robust enough to protect itself from hackers and intruders.
    Appears in Collections:[資訊工程學系所] 碩士論文

    Files in This Item:

    File SizeFormat
    091THU00394021-001.pdf1355KbAdobe PDF924View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback