期刊文献+

WLAN安全检测与评估系统的设计与实现 被引量:1

The Design and Implementation of WLAN Security Auditing and Evaluation System
下载PDF
导出
摘要 针对无线局域网存在的安全问题,设计并实现了无线局域网安全检测与评估系统。系统能够对基于802.11b的网络进行安全检测,结合漏洞扫描对网络安全性进行评估,给出评估报告及安全建议。 To find security problems of wireless LAN, a Wireless LAN Security Auditing and Evaluation System (WLANSAES) is designed and implemented in this paper. WLANSAES can audit the security of 802. lib-based network, evaluate the security of target network combining auditing, and then present evaluation report and security advices.
出处 《微计算机信息》 北大核心 2007年第30期108-110,共3页 Control & Automation
基金 总装备部预研基金项目(编号不公开)
关键词 无线局域网 802.11 安全检测 评估 WLAN, 802.11, security auditing, evaluation
  • 相关文献

参考文献4

  • 1IEEE Std 802.11b-1999,Part Ⅱ :Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification:HigherSpeed Physical Layer Extension in the 2.4 GHz Band[S].
  • 2ANSI/IEEE Std 802.11,1999 Edition,Part Ⅱ :Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications[S].
  • 3李强,刘秋芳,单洪.WEP协议分析及其统计模型描述.
  • 4陆波波,黄鸿,任雪梅,张燕.802.11无线局域网安全与应用研究[J].微计算机信息,2005,21(5):226-227. 被引量:16

二级参考文献1

  • 1Brewer E,Borisov N,Goldberg I,et al. Security of the WEP algorithm.http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html.

共引文献15

同被引文献15

  • 1赵保华,钱兰,郭雄辉.被动测试中网络监测问题[J].天津大学学报,2006,39(7):801-805. 被引量:1
  • 2马建峰,朱建明,等.无线局域网安全-方法与技术[M].北京:机械工业出版社.2007,7.
  • 3Stubblefield A, Ioannidis J, Rubin A, et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2002: 46-74.
  • 4Ahuja S P, Krishna D. Security Problems in 802.11-based Wireless Networks[C]//Proc. of the 3rd International Conference on Communications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004: 153-164.
  • 5Shu Guoqiang, Lee D. Message Confidentiality Testing of Security Protocols——Passive Monitoring and Active Checking[C]// Proc. of International Federation for Information Processing. [S. l.]: Springer, 2006.
  • 6Shu Guoqiang, Lee D. Testing Security Protocol Properties of Protocol Implementations: A Machine Learning Based Approach[C]//Proc. of International Conference on Distributed Computing Systems. [S. l.]: Springer, 2007.
  • 7Zhang Yongguang, Lee W. Intrusion Detection in Wireless Ad- hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2000: 275-283.
  • 8Wilhelm T. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab[M]. [S. l.]: Syngress, 2010.
  • 9Bacudio A G, Yuan Xiaohong, Chu B T B, et al. An Overview of Penetration Testing[J]. International Journal of Network Security & Its Applications, 2011, 3(6): 19-38.
  • 10Shewmaker J. Introduction to Network Penetration Testing[C]// Proc. of the 7th Annual IT Conference on Security Awareness Fair. Sacramento, USA: [s. n.], 2008.

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部