Study and Discussion of Cyber Attacks Method based on IoT
碩士 === 國立臺北教育大學 === 資訊科學系碩士班 === 106 === In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/a2295q |
id |
ndltd-TW-106NTPT0394012 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-106NTPT03940122019-05-16T00:30:15Z http://ndltd.ncl.edu.tw/handle/a2295q Study and Discussion of Cyber Attacks Method based on IoT 物聯網上的網路攻擊方式之探討與研究 CHEN YU-FANG 陳鈺方 碩士 國立臺北教育大學 資訊科學系碩士班 106 In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which contained personal privacy such as ID numbers and passwords to the Internet. It has made IoT devices a potent amplifying platform for cyber attacks. Due to the increment of hackers, the awareness of network security on Internet of Things is raising promptly as well. This thesis presents a comprehensive overview of cyber attacks and introduces several techniques of IoT attacks such as Sniffing, Distributed Denial-of-Service Attacks(DDoS), Man-in-the-middle attack (MITM), password cracking and cryptography key attack. In the end, an experiment was done to simulate a DDoS attack with UDP flooding on a Raspberry Pi. Once the Raspberry Pi detects a DDoS attack, it will shut down immediately. SHEU JIA-SHING 許佳興 2018 學位論文 ; thesis 79 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺北教育大學 === 資訊科學系碩士班 === 106 === In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which contained personal privacy such as ID numbers and passwords to the Internet. It has made IoT devices a potent amplifying platform for cyber attacks. Due to the increment of hackers, the awareness of network security on Internet of Things is raising promptly as well.
This thesis presents a comprehensive overview of cyber attacks and introduces several techniques of IoT attacks such as Sniffing, Distributed Denial-of-Service Attacks(DDoS), Man-in-the-middle attack (MITM), password cracking and cryptography key attack. In the end, an experiment was done to simulate a DDoS attack with UDP flooding on a Raspberry Pi. Once the Raspberry Pi detects a DDoS attack, it will shut down immediately.
|
author2 |
SHEU JIA-SHING |
author_facet |
SHEU JIA-SHING CHEN YU-FANG 陳鈺方 |
author |
CHEN YU-FANG 陳鈺方 |
spellingShingle |
CHEN YU-FANG 陳鈺方 Study and Discussion of Cyber Attacks Method based on IoT |
author_sort |
CHEN YU-FANG |
title |
Study and Discussion of Cyber Attacks Method based on IoT |
title_short |
Study and Discussion of Cyber Attacks Method based on IoT |
title_full |
Study and Discussion of Cyber Attacks Method based on IoT |
title_fullStr |
Study and Discussion of Cyber Attacks Method based on IoT |
title_full_unstemmed |
Study and Discussion of Cyber Attacks Method based on IoT |
title_sort |
study and discussion of cyber attacks method based on iot |
publishDate |
2018 |
url |
http://ndltd.ncl.edu.tw/handle/a2295q |
work_keys_str_mv |
AT chenyufang studyanddiscussionofcyberattacksmethodbasedoniot AT chényùfāng studyanddiscussionofcyberattacksmethodbasedoniot AT chenyufang wùliánwǎngshàngdewǎnglùgōngjīfāngshìzhītàntǎoyǔyánjiū AT chényùfāng wùliánwǎngshàngdewǎnglùgōngjīfāngshìzhītàntǎoyǔyánjiū |
_version_ |
1719167347675103232 |