Network Time Protocol Applying to Computer Identification

碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock s...

Full description

Bibliographic Details
Main Authors: Kun-Ming Hong, 洪�J閔
Other Authors: Wei-Chung Teng
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/42533730985208667013
id ndltd-TW-095NTUS5392015
record_format oai_dc
spelling ndltd-TW-095NTUS53920152015-12-11T04:04:32Z http://ndltd.ncl.edu.tw/handle/42533730985208667013 Network Time Protocol Applying to Computer Identification 網路時間協定於電腦識別上之應用 Kun-Ming Hong 洪�J閔 碩士 國立臺灣科技大學 資訊工程系 95 One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock skew of every physical device is different from others, and the amount of clock skew, which can be measured over many different network configurations by their approach, is suitable to uniquely identify any remote physical device. However, it’s possible that two devices have very close clock skews such that they are measured as the same device over limited degree of precision. To avoid this kind of misjudgments, this thesis develops another clock skew independent approach. Previous papers from D. L. Mills reported that there exists some characteristic on the way time offset changes during continuous time synchronization with NTP, the network time protocol, and our approach try to utilize these characteristics to distinguish different remote computers. In our experiments, four computers and three NTP servers of different network configurations are used to record the progress of continuous time synchronizations with all possible pairs. By analyzing logs of all pairs with statistics techniques, we have been successful on identifying all servers from every client. Wei-Chung Teng 鄧惟中 學位論文 ; thesis 54 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock skew of every physical device is different from others, and the amount of clock skew, which can be measured over many different network configurations by their approach, is suitable to uniquely identify any remote physical device. However, it’s possible that two devices have very close clock skews such that they are measured as the same device over limited degree of precision. To avoid this kind of misjudgments, this thesis develops another clock skew independent approach. Previous papers from D. L. Mills reported that there exists some characteristic on the way time offset changes during continuous time synchronization with NTP, the network time protocol, and our approach try to utilize these characteristics to distinguish different remote computers. In our experiments, four computers and three NTP servers of different network configurations are used to record the progress of continuous time synchronizations with all possible pairs. By analyzing logs of all pairs with statistics techniques, we have been successful on identifying all servers from every client.
author2 Wei-Chung Teng
author_facet Wei-Chung Teng
Kun-Ming Hong
洪�J閔
author Kun-Ming Hong
洪�J閔
spellingShingle Kun-Ming Hong
洪�J閔
Network Time Protocol Applying to Computer Identification
author_sort Kun-Ming Hong
title Network Time Protocol Applying to Computer Identification
title_short Network Time Protocol Applying to Computer Identification
title_full Network Time Protocol Applying to Computer Identification
title_fullStr Network Time Protocol Applying to Computer Identification
title_full_unstemmed Network Time Protocol Applying to Computer Identification
title_sort network time protocol applying to computer identification
url http://ndltd.ncl.edu.tw/handle/42533730985208667013
work_keys_str_mv AT kunminghong networktimeprotocolapplyingtocomputeridentification
AT hóngjmǐn networktimeprotocolapplyingtocomputeridentification
AT kunminghong wǎnglùshíjiānxiédìngyúdiànnǎoshíbiéshàngzhīyīngyòng
AT hóngjmǐn wǎnglùshíjiānxiédìngyúdiànnǎoshíbiéshàngzhīyīngyòng
_version_ 1718148579158130688