簡易檢索 / 詳目顯示

研究生: 王慶豐
Wang, Ching-Feng
論文名稱: 以代理人技術應用於IPv6 網路安全監控中心之設計與實作
Design and Implementation of Agent Technology for IPv6 Network Security Operation Center
指導教授: 黃悅民
Huang, Y.M.
學位類別: 碩士
Master
系所名稱: 工學院 - 工程科學系碩士在職專班
Department of Engineering Science (on the job class)
論文出版年: 2007
畢業學年度: 95
語文別: 中文
論文頁數: 73
中文關鍵詞: Gaia MethodologyJADEA6NSOC
外文關鍵詞: A6NSOC, IPv6, JADE, Agent, Gaia methodology
相關次數: 點閱:108下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 本論文以代理人技術完成設計與實作一個IPv6 安全監控中心的雛形系統。在一個具規範的軟體工程過程中,以Gaia 方法論進行分析與設計,並結合JADE 框架來實作A6NSOC(Agent-Oriented IPv6 Network Security Operation Center)雛形系統的開發。此系統之代理人內嵌區域端關連演算法來處理多餘的攻擊警報和轉換成警訊。再透過以優先權為基準的過濾演算法排除掉非重要性的攻擊,而對於跨區域大規模的攻擊,例如:4to6 DDoS 攻擊,則使用全域關連演算法來特別處理。本論文完成規劃數種攻擊及場測試景來驗證系統的有效性。就本研究所知,這是第一篇討論到以代理人技術和使用軟體工程規範方法來開發大型IPv6 安全系統。

    The thesis designed and implemented a prototype of Agent-Oriented IPv6 Network Security Operation Center (A6NSOC) based on agent technology. A disciplined software engineering process, based on Gaia methodology for analysis and design and JADE framework for implementation, is used to develop A6NSOC. A local correlation algorithm is embedded in an intelligent agent to aggregate redundant alerts of the same attack into a meta alert and a priority-based filtering algorithm is used to filter non-critical attack. Large scale attacks such as 4to6 DDoS attack are coped with another agent armed with a global correlation algorithm. Several scenario-based experiments are conducted to test its effectiveness. This is, to our knowledge, the first literature covering full software development lifecycle for IPv6 Network Security System.

    第一章 緒論 1 1.1 研究背景 1 1.2 研究動機 3 1.2.1 突顯IPv6仍有安全性問題的隱憂 3 1.2.2 龐大的位址需要關鍵性的集中管理機制 3 1.3 研究貢獻 3 第二章 相關研究 4 2.1 IPV6網路安全性分析 4 2.1.1 IPv4協定的缺陷 4 2.1.2 網路掃描與探測攻擊 4 2.1.3 IP碎片及欺騙攻擊 5 2.1.4 序號欺騙 6 2.1.5 SYN Flood攻擊 7 2.1.6 UDP Flood攻擊 7 2.1.7 ICMP Flood攻擊 7 2.1.8 Smurf攻擊 7 2.1.9 IP分割重組缺陷 7 2.2 IPV6增強安全的優點 8 2.2.1 位址空間的擴增 8 2.2.2 IPSec防護機制 9 2.2.3 Path MTU Discovery 9 2.2.4 移除廣播特性 10 2.3 IPV6潛在的安全性威脅 10 2.3.1 IPv6/IPv4轉換機制的安全性分析 10 2.3.2 6to4轉換機制之安全性分析 11 2.3.3 Tunnel Broker轉換機制之安全性分析 14 2.4 AGENT-ORIENTED SOFTWARE ENGINEERING 16 2.4.1 傳統方法論的挑戰 17 2.4.2 代理人導向的分析與設計方法 21 2.5 代理人技術在網路安全的應用 22 2.5.1 傳統入侵偵測系統的缺點 22 2.5.2 AAFID (Autonomous Agents for Intrusion Detection) 24 2.5.3 JAM (Java Agents for Meta—Learning) 26 2.5.4 MAIDS (Mobile Agent Intrusion Detection System) 28 第三章 A6NSOC系統架構 30 3.1 架構說明 31 3.1.1 IPv6 Network Security Operation Center 31 3.1.2 Sensor 32 3.1.3 警報縮減技術 33 3.1.3.1 Alert Correlation技術 34 3.1.3.2 Alert Filtering技術 34 第四章 A6NSOC系統分析與設計 35 4.1 Gaia方法流程 35 4.2 Modeling A6NSOC by Gaia Methodology 37 4.2.1 A6NSOC Requirements 38 4.2.2 The Analysis phase 39 4.2.3 The Design phase 46 第五章 系統實作與測試 48 5.1 Developing JADE Agents from a Gaia Model 48 5.2 系統開發環境 50 5.3 CASE工具 50 5.3.1 JADE特性 51 5.3.2 JADE主要函式庫 52 5.3.3 JADE 代理人平台 53 5.3.4 JADE 代理人的實作框架 53 5.4 Scenario-based testing 58 5.4.1 測試工具 58 5.4.2 測試場景建置 60 5.4.3 攻擊測試結果 61 第六章 結論與未來工作 68 參考文獻 70

    [1] B. Tseng, Chi-Yuan Chen, Chi Sung Laih, “Design and Implementation of an IPv6-enabled Intrusion Detection System (6IDS)” ,Proceedings of 2004 International Computer Symposium (ICS 2004), Taiwan, Dec. 2004.
    [2] Bellifemine, F., G. Caire, T. Trucco, and G. Rimassa,”JADE programmer’s guide”, Technical report, TelecomItalia, June. 2007.
    [3] Cheyer, Adam and Martin, David,”The Open Agent Architecture”, Journal of Autonomous Agents and Multi-Agent Systems”, Vol. 4 , no. 1, pp. 143-148, March 2001.
    [4] Ching Feng Wang, Chi-Yuan Chen, B. Tseng, Chi Sung Laih, “Detecting 4to6 DDoS Attacks on IPv6Network by Misuse Detection Technology” , Proceedings of 2004 Taiwan Area Network Conference (TANet 2004), Taiwan, Oct. 2004.
    [5] Do Hyeon Lee, Jeom Goo Kim,” Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks”, Springer Berlin / Heidelberg, Vol. 4253, pp. 564-571, October 2006.
    [6] Eugene H. Spafford and Diego Zamboni, “Intrusion detection using autonomous agent”,Computer Networks, Vol. 34, pp. 547-570, Oct. 2000.
    [7] F. Zambonelli, N. R. Jennings, and M. Wooldridge”Developing Multiagent Systems: The Gaia Methodology”, In ACM Transactions on Software Engineering Methodology, Vol. 12(3) , pp. 317–370, July 2003.
    [8] Helmer, G., Wong, J., Honavar, V., and Miller, L., “Lightweight Agents for Intrusion Detection”, Journal of Systems and Software. Vol. 67, pp. 109-122, 2003.
    [9] Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., Wang, Y., Wang, X., and Stakhanova, N,” Software Fault Tree and Colored Petri Net Based Specification, Design, and Implementation of Agent-Based Intrusion Detection Systems,” International Journal of Information and Computer Security. Vol. 1, No. 1, pp. 09-142, 2007.
    [10] Lee W,Stolfo S J,Mok K W,”A data mining framework for building intrusion detection models”, In:Proc. of the 1999 IEEE Symposium on Security and Privacy, May 1999.
    [11] M.Wooldridge,”Agent-based Software Engineering”, In IEE Proceedings on Software Engineering, Vol. 144, pp. 26-37, February 1997.
    [12] Martin, David L. and Cheyer, Adam J. and Moran, Douglas B,”The Open Agent Architecture: A Framework for Building Distributed Software Systems”, Applied Artificial Intelligence, vol. 13, no. 1-2, pp. 91-128, January-March 1999.
    [13] Moraitis, P., Spanoudakis N., “The Gaia2JADE Process for Multi-Agent Systems Development”, Applied Artificial Intelligence Journal, Taylor & Francis, Vol. 20, No. 4-5, April, 2006.
    [14] Michael Wooldridge, An Introduction to MultiAgent Systems, John Wiley & Sons Ltd, 2002, paperback, 366 pages, ISBN 0-471-49691-X.
    [15] Moraitis, P., Spanoudakis N., “Combining Gaia and JADE for Multi-Agent Systems Development”,In Proc. Fourth International Symposium “From Agent Theory to Agent Implementation” (AT2AI'04), Vienna, Austria, 2004.
    [16] N.R. Jennings,” Agent-based computing: Promise and perils”, In Proceedings of the 16th International Joint Conference on Artificial Intelligence (IJCAI-99), pages 1429–1436, 1999.
    [17] N.R. Jennings, “An Agent-Based Approach for Building Complex Software Systems”, Communications of the ACM, Vol.44, No.4, pp.35-41, 2001.
    [18] Nightingale, S., Montgomery,D., Frankel,S.,Carson,M.,” National Institute of Standards and Technology (NIST) Special Publication 500- 267 (Draft), A Profile for IPv6 in the U.S. Government – Version 1.0”, January 2007. Currently available at: http://www.antd.nist.gov/usgv6-v1-draft.pdf .

    [19] P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, A. Perini. TROPOS: An Agent-Oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems. Kluwer Academic Publishers Volume 8, Issue 3, Pages 203 - 236, May 2004.
    [20] P. Savola, C. Patel, ”Security Considerations for 6to4”, RFC3964, Dec. 2004.
    [21] Pei-Hsuan Huang, Cheng-Ying Lin, Ching-Feng Wang, B. Tseng,”Agent-Oriented Intelligent IPv6 Network Security Operation Center” , Proceedings of 2006 Taiwan Area Network Conference (TANet 2006), Taiwan, Oct. 2006.
    [22] Steven Bellovin, “Security Problems in the TCP/IP Protocol Suite”, Computer Communication Review, Vol. 19, No. 2,pp. 32–48, April 1989.
    [23] S. Bellovin,” Problem areas for the IP security protocols”, In Proceedings of the 6th
    USENIX Security Symposium, San Jose, California, July 1996.
    [24] Wood, Mark & Scott A. DeLoach,”An Overview of the Multiagent Systems Engineering Methodology”, The First International Workshop on Agent-Oriented Software Engineering (AOSE-2000), June 10, 2000.
    [25] Wang, Y., Behera, S., Wong, J., Helmer, G., Honavar, V., Miller, L., and Lutz, R., Towards Automatic Generation of Mobile Agents for Distributed Intrusion Detection Systems. Journal of Systems and Software, Vol. 79, pp. 1-14, 2006.
    [26] Zheng-Ying Lin, Yong-Ming Huang, Chi Yuan Chen, B. Tseng, “Detection and Prevention of DDoS Attack over Wireless IPv6 Network”, Proceedings of 2005 Taiwan Area Network Conference (TANet 2005), Taiwan, Sep. 2005.

    無法下載圖示 校內:2057-07-19公開
    校外:2057-07-19公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE