期刊文献+

无线局域网入侵检测系统分析设计 被引量:2

Analysis and Design of Intrusion Detection System in WLAN
下载PDF
导出
摘要 入侵检测系统是保障无线局域网安全的重要措施。在深入分析WLAN存在的安全问题及常见攻击的入侵原理后,设计了一种分布式无线入侵检测系统。该系统采用层次模型,通过对捕获的数据包进行协议分析,使用特征匹配与统计分析相结合的检测方法,实现对WLAN常见入侵的检测。理论分析表明:系统能有效检测Wardriving入侵、非法AP、DoS、MAC地址欺骗等无线网络入侵行为,可用于无线局域网的某些安全应用中。 Intrusion detection system is an important device to protect the security of wireless local area network (WLAN). After analyzing the security and intrusion principles of WLAN in detail, a new distribution wireless intrusion detection system is designed, which use protocol analysis, feature matching and statistical analysis to detect intrusion. It is proved by theory that the new intrusion detection system can detect wireless network intrusion behavior of Wardriving, rogue AP, DoS and MAC address spoofing, and it can also be used to protect the security of WLAN in some fields.
机构地区 西安邮电学院
出处 《微型电脑应用》 2009年第8期1-3,共3页 Microcomputer Applications
基金 陕西省自然科学基础研究计划项目(SJ08-ZT14)
关键词 入侵检测系统 无线局域网 MAC欺骗 Wardriving攻击 DOS攻击 Intrusion detection system WLAN MAC address spoofing Wardriving DoS
  • 相关文献

参考文献7

  • 1冯柳平,刘明业,刘祥南.无线局域网的Wardriving入侵检测[J].北京理工大学学报,2005,25(5):415-418. 被引量:3
  • 2Joshua Wright, GCIH, CCNA. Detecting wireless LAN MAC address spoofing [EB/OL]. http:// home. jwu.edu/ jwrigh,2003-01.
  • 3Lim Y X, Schmoyer T, Levme J, et at. Wireless intrusion detection and response [C]// Proceedings of the 2003 IEEE Work-shop on Information Assurance. New York: United States Military Academy, West Point.2003.68-75.
  • 4朱会东,黄艳,黄永丽.无线局域网中的入侵检测研究与设计[J].计算机技术与发展,2007,17(6):173-175. 被引量:4
  • 5Bellardo J,Savage S.802.11 Denial-of-Service Attacks: Re2al Vulnerabilities and Practical Solutions [EB/OL]. http: // ramp. ucsd. edu/ bellardo/ pubs/ usenix- sec03- 8021 ldos- html/index.html, 2003.
  • 6卞小香,张晓山,刘星成.小IP报文攻击的入侵检测方法研究[J].计算机工程与应用,2007,43(17):119-122. 被引量:1
  • 7Wright J. Lay 2 Analysis of WLAN discovery applications for intrusion detection [EB/OL]. http:// home. jwu.edu/ jwright/papers/12-wlan-ids.pdf, 2002- 11.

二级参考文献24

  • 1赵跃华,蒋军,蔡贵贤.嵌入式系统中入侵检测的设计与实现[J].电子技术应用,2006,32(5):62-64. 被引量:3
  • 2李捷.IEEE802.11i无线局域网安全技术[J].中国无线电,2006(7):9-11. 被引量:1
  • 3Arbaugh W A, Shankar N, Wan Y C J. Your 802.11 network has no clothes[Z]. First IEEE International Conference on Wireless LANs and Home Networks, Suntec City, Singapore, 2001.
  • 4Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: The insecurity of 802.11[Z].The Seventh Annual International Conference on Mobile Computer and Networking, Rome, Italy,2001.
  • 5Fluhrer S, Mantin I, Shamir A. Weaknesses in the key scheduling algorithm of RC4[Z]. Eighth Annual Workshop on Selected Areas in Cryptography,Toronto, Canada, 2001.
  • 6Stubblefield A, Ioannidis J, Rubin A D. Using the Fluhrer, Mantin, and Shamir attack to break WEP[R]. AT&T Labs Technical Report TD-4ZCPZZ,Revision 2, 2001.
  • 7Lim Y X, Schmoyer T, Levine J, et al. Wireless intrusion detection and response[A]. Proceedings of the 2003 IEEE Workshop on Information Assurance[C]. New York: United States Military Academy,West Point,2003. 68-75.
  • 8Gast M S. 802.11 Wireless networks: The definitive uide[M]. Beijing: Tsinghua University Press,2002.
  • 9Wright J. Lay 2 Analysis of WLAN discovery applications for intrusion detection[EB/OL], http://home.jwu.edu/jwright/papers/12-wlan-ids.pdf,200211-08/2004-04-20.
  • 10Milner M. NetStumbler v0.4.0 release notes[EB/OL]. http ://www.stumbler.net/readme/readme_0_4_0.html, 2004-04-21/2004-05-17.

共引文献5

同被引文献6

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部