期刊文献+

无线局域网自适应安全管理框架及其应用 被引量:3

An Adaptive Security Management Framework for Wireless Local Area Network and Its Application
下载PDF
导出
摘要 针对无线局域网易受攻击、入侵等诸多安全问题,提出一种分布式无线局域网(WLAN)安全管理框架(ASMF),并基于该框架实现了自适应的安全管理系统(ASMS).ASMF框架依据协议分析和测试理论,即:应用主动分析法,通过构造、执行攻击测试用例,与待测协议进行交互,模拟WLAN漏洞的攻击行为,分析WLAN的防御能力;应用被动分析技术,通过实时的网络报文分析、网络性能监测和自适应调整监测策略进行综合的WLAN安全分析和安全管理.与已有的安全系统相比,ASMF不仅能够被动地检测攻击,而且可以主动地探测未知漏洞与威胁,同时根据网络配置自适应调整防御策略,其良好的扩展性使得用户可针对新型攻击的测试、检测和自定制管理策略进行自由扩展. An adaptive security manage framework (ASMF) for WLAN (wireless local area network) is presented to focus on security problems of of WLAN, based on which an adaptive security management system (ASMS) is built. The ASMF bases on the theory of protocol analyse and the theory of protocol testing. The active analysis method is applied to interact on the protocol by constructing the test case while the passive analysis method is applied to monitor the network data flow and the performance of WLAN. Hence, the ASMF can analyse the security of WLAN and manage the WLAN from integer. Compared with the existing security systems, the ASMF not only detects the attack passively, but also probes unknown threats. In addition the ASMF can ad-just the defensive strategy according the configure of the WLAN. The good expansibility of ASMF allows users to extend new attacking testing, new attack detecting and customizing man-agement strategy easily.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2010年第4期34-38,56,共6页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60872009 60602016) 国家高技术研究发展计划资助项目(2007AA01Z428 2009AA01Z148) 安徽省自然科学研究计划重大项目(ZD2008005-2 ZD200904 JK2009A013 JK2009A025)
关键词 无线局域网 安全管理系统 管理框架 wireless local area network security management system manage framework
  • 相关文献

参考文献13

  • 1IEEE P802.11 IEEE standard for wireless LAN-Medium access control and physical layer specification[S].Piscataway,NJ,USA:IEEE,2007.
  • 2TEWS E Attacks on the wep protocol[EB/OL].[2009-01-12].http://eprint.iacr.org/.
  • 3MISHRA A,ARBAUGH W A.An initial security analysis of the IEEE 802.1X standard CS-TR 4328[R].Maryland,USA:University of Maryland.Department of Computer Science,2002.
  • 4FLUHRER S,MANTIN I,SHAMIR A.Weaknesses in the key scheduling algorithm of RC4[M]//Lecture Notes in Computer Science.Berlin,Germany:Springer,2001-1-24.
  • 5TEWS E,WEINMANN R P,PYSHKIN A,Breaking 104 bit WEP in less than 60 seconds[Ml//Lecture Notes in Computer Science.Berlin,Germany:Springer,2007:188-202.
  • 6TEWS E,BECK M.Practical attacks against WEP and WPA[C]//Proceedings of the 2nd ACM Conference on Wireless Network Security.New York:USA:ACM,2009:79-86.
  • 7Air Magnet Inc.Air magnet enterprise 24/7 WLAN security and performance monitoring[EB/OL].[2009-01-09].http://www.airmagnet.com/products/enterprise/.
  • 8Fluke Inc.Analyze air wi-fi spectrum analyzer[EB/ OL].[2009-01-09].http://www.flukenetworks.com/fnet/en-us/products/AnalyzeAir/Overview.htm? wbc_purpose=BasiNewsListingsupp.
  • 9Air Defense Inc.Enterprise wireless LAN security and WLAN monitoring[EB/OL].[2009-1-20].http:// www.airdefense.net/.
  • 10陈伟琳,周颢,赵保华.利用构造类别代数的协议安全测试方法[J].西安交通大学学报,2008,42(12):1481-1485. 被引量:4

二级参考文献13

  • 1CCITT. 290-ISO/IEC 9646-1991 Information technology open systems interconnection conformance testing methodology and framework [S]. Geneva, Switzerland: CCITT, 1991.
  • 2ANDY WANG Ju'an. Security testing in software engineering courses [C]///34th ASEE/IEEE Frontiers in Education Conference. Piscataway, NJ, USA: 2004:13-18.
  • 3HUANG Chung-Ming, LIN Chih-Hao. An EFSM-based formal model for providing VCR-like functions in multimedia systems[C]//Proceedings of the 12th International Conference on Software Engineering Workshop on Multimedia Software Engineering. Los Alamitos, CA,USA: IEEE Comp. Soc., 1998:12-19.
  • 4DEMILLO R A, LIPTON R J, SAYWARD F G.Hints on test data selection: help for the practicing programmer[J]. Computer, 1978,11(4):34-37.
  • 5AGRAWAL H, DEMILLO R A. Design of mutant operators for the c programming language, SERC-TR-41-P [R]. West Lafayette, IN, USA: Software Engineering Research Center, Purdue University, 1989.
  • 6SPAFFORD E H. Extending mutation testing to find environmental bugs [J]. Software Practice and Experience 1990,20(2) : 181-189.
  • 7JIANG Ying, HOU Shanshan. Contract-based mutation for testing components [C]//Proceedings of 21st IEEE International Conference on Software Maintenance. Los Alamitos, CA, USA: IEEE Comp. Soc. ,2005 : 483-492.
  • 8Institute of Electrical and Electronic Engineers. ANSI/ IEEE 802.1X-2001 Standard for local and metro politan area networks port based network access control [S]. Piscataway, NJ, USA:IEEE, 2001.
  • 9ABOBA B. IEEE 802.1X network port authentication [EB/OL]. [2008-12-20]. http://www, drizzle, com/ aboba/IEEE/.
  • 10ABOBA B, BLUNK L, VOLLBRECHT J, et al. RFC3748 Extensible authentication protocol (EAP) [S]. Reston, VA, USA: Internet Society, 2004.

共引文献6

同被引文献28

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部