شماره مدرك :
8196
شماره راهنما :
7594
پديد آورنده :
فرهنگ، صادق
عنوان :

ارائه مكانيزم مقابله با حملات تشخيص سيستم عامل با استفاده از نظريه بازي ها

مقطع تحصيلي :
كارشناسي ارشد
گرايش تحصيلي :
مخابرات سيستم
محل تحصيل :
اصفهان: دانشگاه صنعتي اصفهان، دانشكده برق و كامپيوتر
سال دفاع :
1392
صفحه شمار :
نه،96ص.: مصور،جدول،نمودار
يادداشت :
ص.ع.به فارسي و انگليسي
استاد راهنما :
محمد حسين منشئي
استاد مشاور :
علي فانيان
توصيفگر ها :
الگوريتم BayesDefender , Perfect Bayesian Nash Equilibrium
تاريخ نمايه سازي :
10/9/92
دانشكده :
مهندسي برق و كامپيوتر
كد ايرانداك :
ID7594
چكيده فارسي :
به فارسي و انگليسي: قابل رويت در نسخه ديجيتالي
چكيده انگليسي :
A Game Theoretic Approach for Counter Fingerprinting Operating System Sadegh Farhang s farhang@ec iut ac ir Date of Submission 2009 06 23 Department of Electrical and Computer Engineering Isfahan University of Technology Isfahan 84156 83111 Iran Degree M Sc Language FarsiSupervisor Mohammad Hossein Manshaei manshaei@cc iut ac irAbstract In computer networks service providers are basically unaware of the type of connectednodes These nodes could be potentially an attacker who would launch an attack at anytime during their connections Hence service providers must consider all potential types ofattackers when they provide service to different nodes In this thesis we focus on aparticular type of attack named remote operating system fingerprinting With OSfingerprinting the attacker tries to recognize the operating system of the server in order toexploit its vulnerabilities We first develop an incomplete information two player game toanalyze the interaction between the server and an unknown connected node In particular we consider two types of nodes i e attacker and benign nodes We analyze the gameusing perfect Bayesian Nash equilibrium PBNE with different conditions We finallydesign the BayesDefender algorithm using the calculated PBNE profiles BayesDefender isnot only able to defend against OS fingerprinting but also provide good quality services tobenign nodes We also implement the BayesDefender and show its performance on a realplatform Keywords Fingerprint Operating System Attack Game Theory BayesDefender Algorithm PerfectBayesian Nash Equilibrium
استاد راهنما :
محمد حسين منشئي
استاد مشاور :
علي فانيان
لينک به اين مدرک :

بازگشت