Summary: | 碩士 === 國立中央大學 === 資訊工程學系 === 105 === With the advent of broadband, wireless networking, and convergence of
different communication technologies being adopted by HANs, these insiderattack
incidents have further increased because anyone could breakthrough
the network and penetrate other insider devices if they are located within
the wireless communication range. Our proposed security system/mechanism
uses identity exchange of sensor agents and shadow hosts to redirect the attack.
Since all the detail and characteristics of every sensor agents and shadow
hosts cannot not be easily recognized,the attacker may be easily fooled and
trapped into our shadow hosts. Moreover, it is not cost-effective to assign
much computing resource to just penetrate one specific sensor agent. This
forces the attacker to roughly scan and inspect all these shadow hosts one
by one before reaching to our sensor agents, which resembles a MAZE for
entrapping the attacker. In our performance analysis, we show that our proposed
security system/mechanism can even detect and handle general insider
attacks/intrusion with the limited hardware resources of a Raspberry Pi 3.
|