期刊文献+

无线局域网安全性能测试系统的设计与实现 被引量:8

Design and Implementation of Security Performance Test System for Wireless Local Area Network
下载PDF
导出
摘要 在主动测试技术、被动测试技术及渗透测试分析基础上,提出一种基于渗透测试方案的无线局域网安全测试系统。该系统可对WEP、WPA、WPA2和WAPI 4种安全机制进行安全协议符合性验证和设备协议安全测试,并进行安全性能评估。对无线局域网组网设备的测试结果证明,该系统能够进行协议一致性测试和渗透测试,可自动集成测试流程。 Based on the analysis of active test, passive test and penetration test, one wireless LAN security test system based on penetration test is proposed in this paper. This system can make security protocol compliance verification and equipment protocol security testing against WEP, WPA, WPA2 and WAPI, and can give the report about safety evaluation. The design and implementation of the system is proposed, and the test results against the wireless equipments are given. The results show that the system can make security protocol compliance verification and penetration test and the test process of the system is automated.
出处 《计算机工程》 CAS CSCD 2013年第7期193-199,共7页 Computer Engineering
基金 国家科技支撑计划基金资助项目(2012BAK26B01)
关键词 无线局域网 安全性能测试 渗透测试 主动测试 被动测试 安全协议符合性验证 设备协议安全测试 Wireless LAN(WLAN) security performance test penetration test active test passive test security protocol complianceverification equipment protocol security test
  • 相关文献

参考文献16

  • 1马建峰,朱建明,等.无线局域网安全-方法与技术[M].北京:机械工业出版社.2007,7.
  • 2Stubblefield A, Ioannidis J, Rubin A, et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP[C]//Proc. of Network and Distributed Systems Security Symposium. San Diego, USA: [s. n.], 2002: 46-74.
  • 3Ahuja S P, Krishna D. Security Problems in 802.11-based Wireless Networks[C]//Proc. of the 3rd International Conference on Communications, Internet, and Information Technology. [S. l.]: IEEE Press, 2004: 153-164.
  • 4Shu Guoqiang, Lee D. Message Confidentiality Testing of Security Protocols——Passive Monitoring and Active Checking[C]// Proc. of International Federation for Information Processing. [S. l.]: Springer, 2006.
  • 5Shu Guoqiang, Lee D. Testing Security Protocol Properties of Protocol Implementations: A Machine Learning Based Approach[C]//Proc. of International Conference on Distributed Computing Systems. [S. l.]: Springer, 2007.
  • 6胡运松,单洪,马涛.WLAN安全检测与评估系统的设计与实现[J].微计算机信息,2007,23(30):108-110. 被引量:1
  • 7Zhang Yongguang, Lee W. Intrusion Detection in Wireless Ad- hoc Networks[C]//Proc. of the 6th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2000: 275-283.
  • 8吴建平,尹霞.基于形式化方法的协议测试理论[J].清华大学学报(自然科学版),2001,41(4):203-208. 被引量:9
  • 9赵保华,钱兰,郭雄辉.被动测试中网络监测问题[J].天津大学学报,2006,39(7):801-805. 被引量:1
  • 10Wilhelm T. Professional Penetration Testing: Creating and Operating a Formal Hacking Lab[M]. [S. l.]: Syngress, 2010.

二级参考文献20

  • 1陆波波,黄鸿,任雪梅,张燕.802.11无线局域网安全与应用研究[J].微计算机信息,2005,21(5):226-227. 被引量:16
  • 2Long C著.北京超品技术有限责任公司译[J].IP网络设计,2002,09.
  • 3[2]Broy M. Formal description techniques——how formal and descriptive are they? [A]. Gotzhein R, Bredereke J. Proceedings of IFIP TC6 International Conference on Formal Description Techniques IX/Protocol Specification, Testing and Verification XVI [C]. German: Kaiserslautern, 1996. 95-110.
  • 4[3]Bolognesi T, Brinksma E. Introduction to the ISO specification language LOTOS [J]. Computer Network and ISDN Systems, 1987, 14: 25-29.
  • 5[4]ISO/IEC JTV1/SC21 WG7. Information Retrieval, Transfer and Management for OSI Framework: Formal Methods in Conformance Testing [S].
  • 6[5]Tretmans J. A formal Approach to Comformance Testing [D]. Enschede: University of Twente, 1992.
  • 7[6]Tretmans J. A formal approach to comformance testing [A]. Rafiq O. Sixth International Workshop on Protocol Test System [C]. NorthHolland: Elseviern Science B V, 1993. 257-276.
  • 8[7]Tretmans J. Testing labelled transition systems with input and output [A]. 8th IFIP WG6.1 International Workshop on Protocol Test System [C]. NorthHolland, 1995.
  • 9[1]Kristoffersen F, Phalippou M, Tretmans J. Formal methods in conformance testing [A]. Proceedings of IFIP Workshop on PSTV.'96 [C]. 1996. 35-42.
  • 10杨波.网络安全理论与应用[M].北京:电子工业出版社,2001..

共引文献30

同被引文献50

  • 1刘严,胡敏.性能测试中脚本捕获的方法研究与应用[J].计算机工程,2006,32(22):94-95. 被引量:3
  • 2张忠磊,孙玉娟,李秀芳.国产软硬件在实现电子政务集成应用上的框架研究[J].微计算机信息,2006(12X):198-199. 被引量:4
  • 3王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 4Lee Y, Kim K, Choi Y. Optimization of AP placement and channel assignment in wire LANs [J]. IEEE Computer Socie- ty, 2011, 27 (11): 831-836.
  • 5Eisenblatter A, Geerdes HF, Siomina I. Integrated access point placement and channel assignment for wireless LANs in an indoor office environment [J]. Mobile and Multimedia Net- works, 2010, 8 (5): 1-10.
  • 6Akland R, Arepally A. Dynamic channel assignment in IEEE 802. 11 networks [C] //International Conference on Portable Information Devices, 2007: 1-5.
  • 7Rodrigues RC, Mateus GR, Loureiro AAF. Optimal base sta- tion placement and fixed channel assignment applied to wireless local area network projects [C] //IEEE International Confe- rence on Networks, 1999: 186-190.
  • 8Mishra A, Imerjee S, Arbaugh W. Weighted coloring based chan- nel assignment for WLANs [J]. ACM SIGMOBILE Mobile Compu- tingandrranunications Review, 2009, 9 (1): 19-31.
  • 9Haidar M, Akl R, A1-Rizzo H, et al. Optimal load distribu- tion in large scale WLAN networks utilizing a power manage- ment algorithm[C] //Proceedings of IEEE Sarnoff Symposi- um, 2007.
  • 10Boulmalf M, El-Sayed H, Soufyane A. Measured throughput and SNR of IEEE 802. llg in a small enterprise environment [ C ] //IEEE Vehicular Technology Conference, 2003: 1333-1337.

引证文献8

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部