Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電機工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88839
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor雷欽隆zh_TW
dc.contributor.advisorChin-Laung Leien
dc.contributor.author王棠葳zh_TW
dc.contributor.authorTang-Wei Wangen
dc.date.accessioned2023-08-15T17:59:58Z-
dc.date.available2023-11-09-
dc.date.copyright2023-08-15-
dc.date.issued2023-
dc.date.submitted2023-08-08-
dc.identifier.citation[1] Virustotal. https://www.virustotal.com/.
[2] Telnet Protocol Specification. RFC 854, May 1983.
[3] Putty. https://www.putty.org/, 2022.
[4] libssh: The ssh library! https://www.libssh.org/, 2023.
[5] libssh2: the ssh library. https://www.libssh2.org/, 2023.
[6] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Du-rumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, et al. Understanding the mirai botnet. In 26th {USENIX} security symposium ({USENIX} Security 17), pages 1093–1110, 2017.
[7] AsyncSSH. Asynchronous ssh for python. https://asyncssh.readthedocs.io/en/latest/, 2023.
[8] M. Başer, E. Y. Güven, and M. A. Aydın. Ssh and telnet protocols attack analysis using honeypot technique: Analysis of ssh and telnet honeypot. In 2021 6th International Conference on Computer Science and Engineering (UBMK), pages 806–811. IEEE, 2021.
[9] W. Z. Cabral, C. Valli, L. F. Sikos, and S. G. Wakeling. Advanced cowrie configuration to increase honeypot deceptiveness. In ICT Systems Security and Privacy Protection: 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22–24, 2021, Proceedings, pages 317–331. Springer, 2021.
[10] K. Chanda. Password security: an analysis of password strengths and vulnerabilities. International Journal of Computer Network and Information Security, 8(7):23, 2016.
[11] D. Dagon, C. C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS, volume 6, pages 2–13, 2006.
[12] droberson. ssh-honeypot. https://github.com/droberson/ssh-honeypot, 2022.
[13] Go. ssh. https://pkg.go.dev/golang.org/x/crypto/ssh, 2023.
[14] S. Kemppainen and T. Kovanen. Honeypot utilization for network intrusion detection. Cyber Security: Power and Technology, pages 249–270, 2018.
[15] M. Knöchel and S. Wefel. Analysing attackers and intrusions on a high-interaction honeypot system. In 2022 27th Asia Pacific Conference on Communications(APCC), pages 433–438. IEEE, 2022.
[16] C. M. Lonvick and T. Ylonen. The Secure Shell (SSH) Transport Layer Protocol. RFC 4253, Jan. 2006.
[17] Oosterhof. cowrie. https://github.com/cowrie/cowrie, 2023.
[18] Y. M. P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow. Iotpot: Analysing the rise of iot compromises. Emu, 9(1), 2015.
[19] A. Puig. Cybersecurity advice to protect your connected devices and accounts. https://consumer.ftc.gov/consumer-alerts/2022/03/cybersecurity-advice-protect-your-connected-devices-and-accounts, 2022.
[20] J. Salvio and R. Taya. Rapperbot ddos botnet expands into cryptojacking. https://www.fortinet.com/blog/threat-research/rapperbot-ddos-botnet-expands-into-cryptojacking, 2023.
[21] O. Surnin, F. Hussain, R. Hussain, S. Ostrovskaya, A. Polovinkin, J. Lee, and X. Fernando. Probabilistic estimation of honeypot detection in internet of things environment. In 2019 International Conference on Computing, Networking and Communications (ICNC), pages 191–196. IEEE, 2019.
[22] A. Z. Tabari and X. Ou. A first step towards understanding real-world attacks on iot devices. arXiv preprint arXiv:2003.01218, 2020.
[23] A. Vetterl, R. Clayton, and I. Walden. Counting outdated honeypots: Legal and useful. In 2019 IEEE Security and Privacy Workshops (SPW), pages 224–229. IEEE, 2019.
[24] B. Wang, Y. Dou, Y. Sang, Y. Zhang, and J. Huang. Iotcmal: Towards a hybrid iot honeypot for capturing and analyzing malware. In ICC 2020-2020 IEEE International Conference on Communications (ICC), pages 1–7. IEEE, 2020.
-
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/88839-
dc.description.abstract隨著物聯網(IoT)設備數量的急速增加,它們已成為網路攻擊的目標,例如botnet中的「Mirai」和「Gafgyt」。這些攻擊通常利用物聯網設備的漏洞,並透過SSH或Telnet傳播,這是許多路由器和IP攝像頭等設備常用的通訊協定。為了防範這類攻擊,蜜罐(honeypot)被證明是一個有用的工具。它通過模擬能被攻擊的平台、機器或服務,作為誘餌來吸引攻擊者。蜜罐不僅能夠誤導攻擊者,使其轉移對真實目標的注意力,而且還使防禦者能夠更深入地分析攻擊者使用的策略和技術。在這個實驗中,我們同時部署了四個不同配置的SSH/Telnet蜜罐,使我們能夠更深入地了解攻擊者的行為。結果,我們在實驗中識別出至少54種不同類型的攻擊,並依據其出現頻率從中挑選了14種攻擊,進行更深入的分析。我們指出了一些有用的特徵,並整理了一份簡單的指南,以幫助人們抵禦當前的botnet威脅。zh_TW
dc.description.abstractWith the rapid increase in the number of IoT devices, they have become targets for cyber attacks, such as the botnets "Mirai" and "Gafgyt." These attacks often exploit vulnerabilities in IoT devices, particularly through SSH or telnet connections commonly used by devices like routers and IP cameras. To defend against such attacks, a honeypot proves to be a valuable tool. It operates by simulating a vulnerable platform, machine, or service, serving as a decoy to lure attackers. Not only does the honeypot mislead attackers by diverting their attention from the real target, but it also enables defenders to analyze the strategies and techniques employed by the attackers in greater depth. In our case, we deployed four SSH/telnet honeypots with different configurations simultaneously, allowing us to gain deeper insights into the behavior of attackers. As a result, we identified at least 54 distinct types of attacks that occurred during our experiment and picked 14 of them based on appearance frequency to perform deeper analysis. We pointed out some useful features and arranged a simple guideline to help people defend against the current botnet threats.en
dc.description.provenanceSubmitted by admin ntu (admin@lib.ntu.edu.tw) on 2023-08-15T17:59:58Z
No. of bitstreams: 0
en
dc.description.provenanceMade available in DSpace on 2023-08-15T17:59:58Z (GMT). No. of bitstreams: 0en
dc.description.tableofcontents摘要 i
Abstract iii
Contents v
List of Figures vii
List of Tables ix
Chapter 1 Introduction 1
Chapter 2 Related work 5
Chapter 3 Background 7
3.1 SSH and Telnet protocol . . . . . . . . . . . . . . . . . . . . . . . . 7
3.2 Cowrie . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Chapter 4 Methodology 11
4.1 Reconnaissance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.3 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 5 Analysis 17
5.1 Overview of captured data . . . . . . . . . . . . . . . . . . . . . . . 17
5.2 Classification based on command sequence . . . . . . . . . . . . . . 19
5.3 SSH identification string . . . . . . . . . . . . . . . . . . . . . . . . 24
5.4 Parallel intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
5.5 Password length . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.6 Cooperative intrusion . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.7 Single source intrusion and download . . . . . . . . . . . . . . . . . 31
5.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
5.9 Comparison with other works . . . . . . . . . . . . . . . . . . . . . 33
5.10 Guideline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Chapter 6 Conclusion and Future Work 37
References 39
-
dc.language.isoen-
dc.subject蜜罐zh_TW
dc.subjectCowriezh_TW
dc.subject殭屍網路zh_TW
dc.subject物聯網zh_TW
dc.subjectTelnetzh_TW
dc.subjectSSHzh_TW
dc.subject反蜜罐zh_TW
dc.subjectAnti-honeypoten
dc.subjectSSHen
dc.subjectBotneten
dc.subjectCowrieen
dc.subjectTelneten
dc.subjectIoTen
dc.subjectHoneypoten
dc.title現代物聯網僵屍網路行為的深度分析:利用多個蜜罐進行研究zh_TW
dc.titleDeep Analysis of Modern IoT Botnet Behavior with Multiple Honeypotsen
dc.typeThesis-
dc.date.schoolyear111-2-
dc.description.degree碩士-
dc.contributor.oralexamcommittee郭斯彥;王銘宏zh_TW
dc.contributor.oralexamcommitteeSy-Yen Kuo;Ming-Hung Wangen
dc.subject.keyword蜜罐,反蜜罐,SSH,Telnet,物聯網,殭屍網路,Cowrie,zh_TW
dc.subject.keywordHoneypot,Anti-honeypot,SSH,Telnet,IoT,Botnet,Cowrie,en
dc.relation.page41-
dc.identifier.doi10.6342/NTU202303073-
dc.rights.note同意授權(全球公開)-
dc.date.accepted2023-08-09-
dc.contributor.author-college電機資訊學院-
dc.contributor.author-dept電機工程學系-
顯示於系所單位:電機工程學系

文件中的檔案:
檔案 大小格式 
ntu-111-2.pdf638.5 kBAdobe PDF檢視/開啟
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved