期刊文献+

基于设备指纹的无线钓鱼接入点识别方法研究

Research on Wireless Rogue AP Recognition Method Based on Device Fingerprinting
下载PDF
导出
摘要 无线局域网因其架设方便、易于扩展的特点获得了较快的发展,而针对无线局域网的攻击形式也逐渐增多。无线钓鱼攻击是指攻击者架设一个伪装的无线接入点,诱骗用户连接从而进一步窃取用户敏感信息或发动其他主动攻击。文中针对无线局域网中的虚假钓鱼AP攻击提出一种基于设备指纹的AP识别方法。通过向AP发送一系列探测请求帧,记录AP对不同帧的响应结果作为识别AP的特征信息,以此区分合法AP与非法钓鱼AP。实验结果表明基于设备指纹的钓鱼AP检测方法能有效地检测出无线钓鱼AP设备。 Wireless local area network has gained fast development these years due to its being easy to set up and extend. There have more and more WLAN threats. Wireless phishing attack occurs when an attacker sets up a wireless access point disguised to trick the user to connect. Then the attacker can further steal sensitive information or launch other active attacks. In this paper,present an AP fingerprints i-dentification method based on equipment fingerprints for WLAN rogue AP phishing attacks. The proposed method sends a series of probe request frame to the AP,then records the response of different frames as the identification feature information of an AP,in order to distin-guish between the legal AP and illegal fishing AP. Experimental results show that phishing AP detection method based on equipment fin-gerprints can effectively detect wireless phishing AP.
出处 《计算机技术与发展》 2015年第1期143-146,共4页 Computer Technology and Development
基金 国家自然科学基金资助项目(61202353) 大学生创新创业训练计划项目(201310293018Z)
关键词 无线局域网 钓鱼攻击 AP识别 设备指纹 wireless local area network phishing attack AP identification equipment fingerprints
  • 相关文献

参考文献12

二级参考文献48

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部