Study and Discussion of Cyber Attacks Method based on IoT

碩士 === 國立臺北教育大學 === 資訊科學系碩士班 === 106 === In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which...

Full description

Bibliographic Details
Main Authors: CHEN YU-FANG, 陳鈺方
Other Authors: SHEU JIA-SHING
Format: Others
Language:zh-TW
Published: 2018
Online Access:http://ndltd.ncl.edu.tw/handle/a2295q
id ndltd-TW-106NTPT0394012
record_format oai_dc
spelling ndltd-TW-106NTPT03940122019-05-16T00:30:15Z http://ndltd.ncl.edu.tw/handle/a2295q Study and Discussion of Cyber Attacks Method based on IoT 物聯網上的網路攻擊方式之探討與研究 CHEN YU-FANG 陳鈺方 碩士 國立臺北教育大學 資訊科學系碩士班 106 In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which contained personal privacy such as ID numbers and passwords to the Internet. It has made IoT devices a potent amplifying platform for cyber attacks. Due to the increment of hackers, the awareness of network security on Internet of Things is raising promptly as well. This thesis presents a comprehensive overview of cyber attacks and introduces several techniques of IoT attacks such as Sniffing, Distributed Denial-of-Service Attacks(DDoS), Man-in-the-middle attack (MITM), password cracking and cryptography key attack. In the end, an experiment was done to simulate a DDoS attack with UDP flooding on a Raspberry Pi. Once the Raspberry Pi detects a DDoS attack, it will shut down immediately. SHEU JIA-SHING 許佳興 2018 學位論文 ; thesis 79 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺北教育大學 === 資訊科學系碩士班 === 106 === In recent years, the network technology has developed rapidly. With the ubiquity and increasing popularity of the Internet, the Internet of Things connects all items through sensing devices to the Internet. However, the Internet of Things sends data which contained personal privacy such as ID numbers and passwords to the Internet. It has made IoT devices a potent amplifying platform for cyber attacks. Due to the increment of hackers, the awareness of network security on Internet of Things is raising promptly as well. This thesis presents a comprehensive overview of cyber attacks and introduces several techniques of IoT attacks such as Sniffing, Distributed Denial-of-Service Attacks(DDoS), Man-in-the-middle attack (MITM), password cracking and cryptography key attack. In the end, an experiment was done to simulate a DDoS attack with UDP flooding on a Raspberry Pi. Once the Raspberry Pi detects a DDoS attack, it will shut down immediately.
author2 SHEU JIA-SHING
author_facet SHEU JIA-SHING
CHEN YU-FANG
陳鈺方
author CHEN YU-FANG
陳鈺方
spellingShingle CHEN YU-FANG
陳鈺方
Study and Discussion of Cyber Attacks Method based on IoT
author_sort CHEN YU-FANG
title Study and Discussion of Cyber Attacks Method based on IoT
title_short Study and Discussion of Cyber Attacks Method based on IoT
title_full Study and Discussion of Cyber Attacks Method based on IoT
title_fullStr Study and Discussion of Cyber Attacks Method based on IoT
title_full_unstemmed Study and Discussion of Cyber Attacks Method based on IoT
title_sort study and discussion of cyber attacks method based on iot
publishDate 2018
url http://ndltd.ncl.edu.tw/handle/a2295q
work_keys_str_mv AT chenyufang studyanddiscussionofcyberattacksmethodbasedoniot
AT chényùfāng studyanddiscussionofcyberattacksmethodbasedoniot
AT chenyufang wùliánwǎngshàngdewǎnglùgōngjīfāngshìzhītàntǎoyǔyánjiū
AT chényùfāng wùliánwǎngshàngdewǎnglùgōngjīfāngshìzhītàntǎoyǔyánjiū
_version_ 1719167347675103232