| 研究生: |
王慶豐 Wang, Ching-Feng |
|---|---|
| 論文名稱: |
以代理人技術應用於IPv6 網路安全監控中心之設計與實作 Design and Implementation of Agent Technology for IPv6 Network Security Operation Center |
| 指導教授: |
黃悅民
Huang, Y.M. |
| 學位類別: |
碩士 Master |
| 系所名稱: |
工學院 - 工程科學系碩士在職專班 Department of Engineering Science (on the job class) |
| 論文出版年: | 2007 |
| 畢業學年度: | 95 |
| 語文別: | 中文 |
| 論文頁數: | 73 |
| 中文關鍵詞: | Gaia Methodology 、JADE 、A6NSOC |
| 外文關鍵詞: | A6NSOC, IPv6, JADE, Agent, Gaia methodology |
| 相關次數: | 點閱:108 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文以代理人技術完成設計與實作一個IPv6 安全監控中心的雛形系統。在一個具規範的軟體工程過程中,以Gaia 方法論進行分析與設計,並結合JADE 框架來實作A6NSOC(Agent-Oriented IPv6 Network Security Operation Center)雛形系統的開發。此系統之代理人內嵌區域端關連演算法來處理多餘的攻擊警報和轉換成警訊。再透過以優先權為基準的過濾演算法排除掉非重要性的攻擊,而對於跨區域大規模的攻擊,例如:4to6 DDoS 攻擊,則使用全域關連演算法來特別處理。本論文完成規劃數種攻擊及場測試景來驗證系統的有效性。就本研究所知,這是第一篇討論到以代理人技術和使用軟體工程規範方法來開發大型IPv6 安全系統。
The thesis designed and implemented a prototype of Agent-Oriented IPv6 Network Security Operation Center (A6NSOC) based on agent technology. A disciplined software engineering process, based on Gaia methodology for analysis and design and JADE framework for implementation, is used to develop A6NSOC. A local correlation algorithm is embedded in an intelligent agent to aggregate redundant alerts of the same attack into a meta alert and a priority-based filtering algorithm is used to filter non-critical attack. Large scale attacks such as 4to6 DDoS attack are coped with another agent armed with a global correlation algorithm. Several scenario-based experiments are conducted to test its effectiveness. This is, to our knowledge, the first literature covering full software development lifecycle for IPv6 Network Security System.
[1] B. Tseng, Chi-Yuan Chen, Chi Sung Laih, “Design and Implementation of an IPv6-enabled Intrusion Detection System (6IDS)” ,Proceedings of 2004 International Computer Symposium (ICS 2004), Taiwan, Dec. 2004.
[2] Bellifemine, F., G. Caire, T. Trucco, and G. Rimassa,”JADE programmer’s guide”, Technical report, TelecomItalia, June. 2007.
[3] Cheyer, Adam and Martin, David,”The Open Agent Architecture”, Journal of Autonomous Agents and Multi-Agent Systems”, Vol. 4 , no. 1, pp. 143-148, March 2001.
[4] Ching Feng Wang, Chi-Yuan Chen, B. Tseng, Chi Sung Laih, “Detecting 4to6 DDoS Attacks on IPv6Network by Misuse Detection Technology” , Proceedings of 2004 Taiwan Area Network Conference (TANet 2004), Taiwan, Oct. 2004.
[5] Do Hyeon Lee, Jeom Goo Kim,” Conversion Scheme for Reducing Security Vulnerability in IPv4/ IPv6 Networks”, Springer Berlin / Heidelberg, Vol. 4253, pp. 564-571, October 2006.
[6] Eugene H. Spafford and Diego Zamboni, “Intrusion detection using autonomous agent”,Computer Networks, Vol. 34, pp. 547-570, Oct. 2000.
[7] F. Zambonelli, N. R. Jennings, and M. Wooldridge”Developing Multiagent Systems: The Gaia Methodology”, In ACM Transactions on Software Engineering Methodology, Vol. 12(3) , pp. 317–370, July 2003.
[8] Helmer, G., Wong, J., Honavar, V., and Miller, L., “Lightweight Agents for Intrusion Detection”, Journal of Systems and Software. Vol. 67, pp. 109-122, 2003.
[9] Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L., Wang, Y., Wang, X., and Stakhanova, N,” Software Fault Tree and Colored Petri Net Based Specification, Design, and Implementation of Agent-Based Intrusion Detection Systems,” International Journal of Information and Computer Security. Vol. 1, No. 1, pp. 09-142, 2007.
[10] Lee W,Stolfo S J,Mok K W,”A data mining framework for building intrusion detection models”, In:Proc. of the 1999 IEEE Symposium on Security and Privacy, May 1999.
[11] M.Wooldridge,”Agent-based Software Engineering”, In IEE Proceedings on Software Engineering, Vol. 144, pp. 26-37, February 1997.
[12] Martin, David L. and Cheyer, Adam J. and Moran, Douglas B,”The Open Agent Architecture: A Framework for Building Distributed Software Systems”, Applied Artificial Intelligence, vol. 13, no. 1-2, pp. 91-128, January-March 1999.
[13] Moraitis, P., Spanoudakis N., “The Gaia2JADE Process for Multi-Agent Systems Development”, Applied Artificial Intelligence Journal, Taylor & Francis, Vol. 20, No. 4-5, April, 2006.
[14] Michael Wooldridge, An Introduction to MultiAgent Systems, John Wiley & Sons Ltd, 2002, paperback, 366 pages, ISBN 0-471-49691-X.
[15] Moraitis, P., Spanoudakis N., “Combining Gaia and JADE for Multi-Agent Systems Development”,In Proc. Fourth International Symposium “From Agent Theory to Agent Implementation” (AT2AI'04), Vienna, Austria, 2004.
[16] N.R. Jennings,” Agent-based computing: Promise and perils”, In Proceedings of the 16th International Joint Conference on Artificial Intelligence (IJCAI-99), pages 1429–1436, 1999.
[17] N.R. Jennings, “An Agent-Based Approach for Building Complex Software Systems”, Communications of the ACM, Vol.44, No.4, pp.35-41, 2001.
[18] Nightingale, S., Montgomery,D., Frankel,S.,Carson,M.,” National Institute of Standards and Technology (NIST) Special Publication 500- 267 (Draft), A Profile for IPv6 in the U.S. Government – Version 1.0”, January 2007. Currently available at: http://www.antd.nist.gov/usgv6-v1-draft.pdf .
[19] P. Bresciani, P. Giorgini, F. Giunchiglia, J. Mylopoulos, A. Perini. TROPOS: An Agent-Oriented Software Development Methodology. Journal of Autonomous Agents and Multi-Agent Systems. Kluwer Academic Publishers Volume 8, Issue 3, Pages 203 - 236, May 2004.
[20] P. Savola, C. Patel, ”Security Considerations for 6to4”, RFC3964, Dec. 2004.
[21] Pei-Hsuan Huang, Cheng-Ying Lin, Ching-Feng Wang, B. Tseng,”Agent-Oriented Intelligent IPv6 Network Security Operation Center” , Proceedings of 2006 Taiwan Area Network Conference (TANet 2006), Taiwan, Oct. 2006.
[22] Steven Bellovin, “Security Problems in the TCP/IP Protocol Suite”, Computer Communication Review, Vol. 19, No. 2,pp. 32–48, April 1989.
[23] S. Bellovin,” Problem areas for the IP security protocols”, In Proceedings of the 6th
USENIX Security Symposium, San Jose, California, July 1996.
[24] Wood, Mark & Scott A. DeLoach,”An Overview of the Multiagent Systems Engineering Methodology”, The First International Workshop on Agent-Oriented Software Engineering (AOSE-2000), June 10, 2000.
[25] Wang, Y., Behera, S., Wong, J., Helmer, G., Honavar, V., Miller, L., and Lutz, R., Towards Automatic Generation of Mobile Agents for Distributed Intrusion Detection Systems. Journal of Systems and Software, Vol. 79, pp. 1-14, 2006.
[26] Zheng-Ying Lin, Yong-Ming Huang, Chi Yuan Chen, B. Tseng, “Detection and Prevention of DDoS Attack over Wireless IPv6 Network”, Proceedings of 2005 Taiwan Area Network Conference (TANet 2005), Taiwan, Sep. 2005.
校內:2057-07-19公開