Network Time Protocol Applying to Computer Identification
碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock s...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/42533730985208667013 |
id |
ndltd-TW-095NTUS5392015 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NTUS53920152015-12-11T04:04:32Z http://ndltd.ncl.edu.tw/handle/42533730985208667013 Network Time Protocol Applying to Computer Identification 網路時間協定於電腦識別上之應用 Kun-Ming Hong 洪�J閔 碩士 國立臺灣科技大學 資訊工程系 95 One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock skew of every physical device is different from others, and the amount of clock skew, which can be measured over many different network configurations by their approach, is suitable to uniquely identify any remote physical device. However, it’s possible that two devices have very close clock skews such that they are measured as the same device over limited degree of precision. To avoid this kind of misjudgments, this thesis develops another clock skew independent approach. Previous papers from D. L. Mills reported that there exists some characteristic on the way time offset changes during continuous time synchronization with NTP, the network time protocol, and our approach try to utilize these characteristics to distinguish different remote computers. In our experiments, four computers and three NTP servers of different network configurations are used to record the progress of continuous time synchronizations with all possible pairs. By analyzing logs of all pairs with statistics techniques, we have been successful on identifying all servers from every client. Wei-Chung Teng 鄧惟中 學位論文 ; thesis 54 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立臺灣科技大學 === 資訊工程系 === 95 === One of the important security issues on network transaction is to develop trustworthy technologies for remote device identification. T. Kohno et al. proposed a method to generate remote physical device fingerprint recently. They observed that the hardware clock skew of every physical device is different from others, and the amount of clock skew, which can be measured over many different network configurations by their approach, is suitable to uniquely identify any remote physical device. However, it’s possible that two devices have very close clock skews such that they are measured as the same device over limited degree of precision. To avoid this kind of misjudgments, this thesis develops another clock skew independent approach. Previous papers from D. L. Mills reported that there exists some characteristic on the way time offset changes during continuous time synchronization with NTP, the network time protocol, and our approach try to utilize these characteristics to distinguish different remote computers. In our experiments, four computers and three NTP servers of different network configurations are used to record the progress of continuous time synchronizations with all possible pairs. By analyzing logs of all pairs with statistics techniques, we have been successful on identifying all servers from every client.
|
author2 |
Wei-Chung Teng |
author_facet |
Wei-Chung Teng Kun-Ming Hong 洪�J閔 |
author |
Kun-Ming Hong 洪�J閔 |
spellingShingle |
Kun-Ming Hong 洪�J閔 Network Time Protocol Applying to Computer Identification |
author_sort |
Kun-Ming Hong |
title |
Network Time Protocol Applying to Computer Identification |
title_short |
Network Time Protocol Applying to Computer Identification |
title_full |
Network Time Protocol Applying to Computer Identification |
title_fullStr |
Network Time Protocol Applying to Computer Identification |
title_full_unstemmed |
Network Time Protocol Applying to Computer Identification |
title_sort |
network time protocol applying to computer identification |
url |
http://ndltd.ncl.edu.tw/handle/42533730985208667013 |
work_keys_str_mv |
AT kunminghong networktimeprotocolapplyingtocomputeridentification AT hóngjmǐn networktimeprotocolapplyingtocomputeridentification AT kunminghong wǎnglùshíjiānxiédìngyúdiànnǎoshíbiéshàngzhīyīngyòng AT hóngjmǐn wǎnglùshíjiānxiédìngyúdiànnǎoshíbiéshàngzhīyīngyòng |
_version_ |
1718148579158130688 |