§ 瀏覽學位論文書目資料
系統識別號 U0002-0107202120080300
DOI 10.6846/TKU.2021.00023
論文名稱(中文) Mirai特徵辦識之研究
論文名稱(英文) Research on Mirai Characteristic
第三語言論文名稱
校院名稱 淡江大學
系所名稱(中文) 資訊工程學系碩士在職專班
系所名稱(英文) Department of Computer Science and Information Engineering
外國學位學校名稱
外國學位學院名稱
外國學位研究所名稱
學年度 109
學期 2
出版年 110
研究生(中文) 蕭亦筑
研究生(英文) Yi-Ju Hsiao
學號 706410023
學位類別 碩士
語言別 繁體中文
第二語言別
口試日期 2021-06-17
論文頁數 50頁
口試委員 指導教授 - 蔣璿東(081863@mail.tku.edu.tw)
委員 - 王鄭慈(ctwang@tea.ntue.edu.tw)
委員 - 陳伯榮(pozung@mail.tku.edu.tw)
委員 - 蔣璿東(081863@mail.tku.edu.tw)
關鍵字(中) Mirai病毒
物聯網
殭屍網路
關鍵字(英) Mirai
IoT
Botnet
第三語言關鍵字
學科別分類
中文摘要
隨著科技進步所帶來的便利,物聯網(Internet of Thing, IoT)裝置早已深入至民眾的日常生活中,且日趨重要,從個人穿載裝置、電視及冰箱等智慧家電,到智慧城市的網路攝影機、智慧停車和智慧交通等,IoT的應用越來越普及。然而伴隨著IoT應用的多元化,其潛在問題卻逐漸浮現,主要係因IoT裝置缺乏重視安全性及隱私性,且無主動修補漏洞機制,易成為駭客攻擊的目標,例如數據隱私洩漏、竊聽、惡意攻擊或病毒入侵等。
IoT裝置的普及係造成殭屍網路(Botnet)迅速擴散的主因之一,其具有命令和可控制的功能,用於發起各種惡意攻擊。其中,近年以Mirai殭屍網路最為著名,目前已發展出數種家族的變種病毒,曾多次利用被感染的IoT裝置發動分散式阻斷服務攻擊(Distributed Denial of Service, DDoS)攻擊。為有效因應此威脅,本論文提出一個適用於IoT裝置的輕量檢測方式,透過即時偵測系統,能透過連線IP數量,發掘出潛在可疑的病毒,以防止病毒擴散感染其它IoT裝置,以避免其成為DDoS攻擊的來源。
由於Mirai家族病毒所針對之IoT裝置多以Linux作業系統為開發基礎,因此為了讓實驗符合真實環境,本論文採用ubuntu作業系統作為實驗環境,將Mirai家族病毒和一般正常程式分別放入實驗環境中,觀察是否可從系統資源的異常狀態,偵測出Mirai病毒的特徵行為,再使用不同的Mirai家族病毒及一般正常程式作為實際測試樣本,實驗結果發現均能正確判斷出是否為Mirai家族病毒。
英文摘要
The Internet of Things (IoT) has become an increasingly important part of everyday life, from personal wearable devices, smart appliances such as TVs and refrigerators, to smart city webcams, smart parking and smart transportation, IoT applications are everywhere. With the convenience brought by technological advances, the Internet of Things applications are diversified, but less attention to security and privacy, and no active mechanism to repair vulnerabilities. That is to say it is easy to become the target of attacks, as well as bringing various risks, such as data privacy leakage, eavesdropping, third-party attacks or virus invasion, forming a situation where any connected device may be attacked.
Botnets are one of the biggest threats to the rapid proliferation of the Internet of Things, with command and control functions for various malicious activities. Among them, Mirai botnet has developed several families of variant viruses that have been used to launch DDoS attacks on infected IoT devices. This paper proposes a lightweight detection method suitable for IoT devices, through a real-time detection system, which can find suspicious viruses through the number of connected IPs for processing, in order to prevent viruses from continuously infecting other IoT devices and prevent IoT devices from becoming tools for DDoS attacks.
As the Mirai family of viruses against the target, IoT devices are mostly developed based on Linux operating systems. Therefore, in order to make the experiment close to the living state, the ubuntu operating system is used as the experimental environment. In this paper, Miari family viruses and normal programs are put into the experimental environment separately to see whether the characteristic behaviors of Mirai viruses can be detected from the abnormal system resources. Then, different Mirai family viruses and normal programs were used as the actual test samples, and both of them could correctly determine whether they were Mirai family viruses.
第三語言摘要
論文目次
第一章 緒論	1
1.1研究背景與動機	1
1.2研究目的	3
1.3論文架構	4
第二章 相關研究	5
2.1 Mirai病毒源起	5
2.2 Mirai變種病毒	11
2.3 相關研究	12
第三章 實驗架構	14
3.1問題陳述	14
3.2研究方法	16
3.2.1 實驗環境建立	16
3.2.2蒐集Mirai病毒研究其相關特徵行為	17
3.2.3系統資源異常偵測之流程	20
第四章 實驗結果	23
4.1 病毒對系統資源之影響	23
4.2 偵測程式測試結果	29
第五章 結論與未來展望	35
參考資料:	37
附錄A 英文論文	41

圖目錄
圖2.1 Mirai C&C 網域名稱	8
圖2.2 Mirai原始程式支援攻擊類型	8
圖2.3 Mirai Botnet架構及攻擊示意圖	10
圖3.1 TCP 三向交握傳輸協定示意圖	15
圖 3.2 環境架構圖	17
圖3.3檢測異常之實驗步驟	21
圖4.1 Firefox IP連線數	24
圖4.2 Zoom IP連線數	25
圖4.3 gPodder IP連線數	26
圖4.4 Mirai1 IP嘗試連線數	27
圖4.5 sora1 IP嘗試連線數	27
圖4.6 Satori IP嘗試連線數	28
圖4.7 Telegram IP連線數	30
圖4.8 YouTube Music IP連線數	30
圖4.9 Remmina IP連線數	31
圖4.10 Mirai2 IP嘗試連線數	32
圖4.11 sora2 IP嘗試連線數	33
圖4.12 Loligang IP嘗試連線數	34

表目錄
表 2.1 Mirai暴力攻擊用預設密碼	7
表 3.1 Mirai家族病毒種類	19
參考文獻
[1]	J. Manyika et al., "The Internet of Things: Mapping the value beyond the hype," 2015.
[2]	O. I. S. Team., "OWASP-IoT-Top-10-2018-final," 2018.
[3]	維基百科. 密碼強度. Available: https://zh.wikipedia.org/wiki/%E5%AF%86%E7%A0%81%E5%BC%BA%E5%BA%A6
[4]	維基百科. 路由器. Available: https://zh.wikipedia.org/wiki/%E8%B7%AF%E7%94%B1%E5%99%A8
[5]	W. GORDON. (2018-12-6). Six router settings you should change right now. Available: https://www.popsci.com/router-security-settings/
[6]	D. Bonderud. (2016-10-04). Leaked Mirai Malware Boosts IoT Insecurity Threat Level. Available: https://securityintelligence.com/news/leaked-mirai-malware-boosts-iot-insecurity-threat-level/
[7]	E. i. C. Chris Williams. (2016-10-21). Today the web was broken by countless hacked devices – your 60-second summary. Available: https://www.theregister.com/2016/10/21/dyn_dns_ddos_explained/
[8]	B. Krebs. (2016-11-30). New Mirai Worm Knocks 900K Germans Offline. krebsonsecurity.com. Available: https://krebsonsecurity.com/2016/11/new-mirai-worm-knocks-900k-germans-offline/
[9]	J. Chase. (2016-11-29). German leaders angry at cyberattack, hint at Russian involvement. Available: https://www.dw.com/en/german-leaders-angry-at-cyberattack-hint-at-russian-involvement/a-36573668
[10]	I. Trend Micro. (2021-2-23). A Constant State of Flux
Trend Micro 2020 Annual Cybersecurity Report. Available: https://documents.trendmicro.com/assets/rpt/rpt-a-constant-state-of-flux.pdf
[11]	D. o. Justice. (2017-12-13). Justice Department Announces Charges And Guilty Pleas In Three Computer Crime Cases Involving Significant Cyber Attacks. Available: https://www.justice.gov/usao-nj/pr/justice-department-announces-charges-and-guilty-pleas-three-computer-crime-cases
[12]	C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, "DDoS in the IoT: Mirai and Other Botnets," Computer, vol. 50, no. 7, pp. 80-84, 2017.
[13]	T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu, "Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the internet-of-things," in Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 2015, pp. 1-7.
[14]	A. Kumar and T. J. Lim, "EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques," in 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), 2019, pp. 289-294.
[15]	維基百科. 蠻力攻擊. Available: https://zh.wikipedia.org/wiki/%E8%9B%AE%E5%8A%9B%E6%94%BB%E5%87%BB#cite_note-GBT25069-1
[16]	B. Krebs. (2017-1-18). Who is Anna-Senpai, the Mirai Worm Author? Available: https://web.archive.org/web/20170122013744/https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/
[17]	陳曉莉. (2019-09-06). 打造Satori殭屍網路的青少年認罪了. Available: https://www.ithome.com.tw/news/132918
[18]	360网络安全研究院. 安全威胁预警:Mirai变种Satori正在端口 37215 和 52869 上类似蠕虫式传播. Available: https://blog.netlab.360.com/wa-a-new-mirai-variant-is-spreading-in-worm-style-on-port-37215-and-52869/
[19]	TWCERT/CC. (2017-12-26). IoT殭屍網路Satori正大肆攻擊華為家用型router. Available: https://www.twcert.org.tw/newepaper/cp-67-2372-0c9b4-3.html
[20]	FernandoMercês. (2020-07-28). Mirai Botnet Attack IoT Devices via CVE-2020-5902. Available: https://blog.trendmicro.com.tw/?p=65401
[21]	安信與誠. (2019-08-07). 安信與誠-威脅月報(7月份) Available: https://itw01.com/UPYH8E7.html
[22]	Z.-K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, and S. Shieh, "IoT security: ongoing challenges and research opportunities," in 2014 IEEE 7th international conference on service-oriented computing and applications, 2014, pp. 230-234: IEEE.
[23]	Bitdefender. (2017-09-18). Mirai Code Still Runs on Many IoT Devices. Available: https://www.bitdefender.com/box/blog/iot-news/mirai-code-still-runs-many-iot-devices/
[24]	M. Antonakakis et al., "Understanding the mirai botnet," in 26th {USENIX} security symposium ({USENIX} Security 17), 2017, pp. 1093-1110.
[25]	T. S. Gopal, M. Meerolla, G. Jyostna, P. R. L. Eswari, and E. Magesh, "Mitigating Mirai Malware Spreading in IoT Environment," in 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2018, pp. 2226-2230.
[26]	J. M. Ceron, K. Steding-Jessen, C. Hoepers, L. Z. Granville, and C. B. J. S. Margi, "Improving iot botnet investigation using an adaptive network layer," vol. 19, no. 3, p. 727, 2019.
[27]	L. E. S. J. J. o. I. S. E. Jaramillo and Management, "Malware detection and mitigation techniques: lessons learned from Mirai DDOS attack," vol. 3, no. 3, p. 19, 2018.
[28]	維基百科. 零日攻擊. Available: https://zh.wikipedia.org/wiki/%E9%9B%B6%E6%97%A5%E6%94%BB%E5%87%BB
[29]	A. Cui, M. Costello, and S. Stolfo, "When firmware modifications attack: A case study of embedded exploitation," 2013.
[30]	趨勢科技全球技術支援與研發中心. (2019-01-10). 趨勢科技 IoT Security 2.0 改善使用者防護、提升裝置製造商信譽. Available: https://blog.trendmicro.com.tw/?p=58581
[31]	T. I. Team. (2018-10-25). Seven new Mirai variants and the aspiring cybercriminal behind them. Available: https://blog.avast.com/hacker-creates-seven-new-variants-of-the-mirai-botnet
[32]	T. M. Incorporated. (2019/12/19). Into the Battlefield: A Security Guide to IoT Botnets. Available: https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/into-the-battlefield-a-security-guide-to-iot-botnets
論文全文使用權限
校內
校內紙本論文延後至2026-01-01公開
同意電子論文全文授權校園內公開
校內電子論文延後至2026-01-01公開
校內書目立即公開
校外
同意授權
校外電子論文延後至2026-01-01公開

如有問題,歡迎洽詢!
圖書館數位資訊組 (02)2621-5656 轉 2487 或 來信