期刊文献+

无线校园网络钓鱼AP攻击检测技术研究 被引量:2

Research on Detection Technology of Phishing AP Attack for Wireless Campus Network
下载PDF
导出
摘要 随着无线校园网络的发展和普及,无线钓鱼攻击更具有隐蔽性和破坏性。通过分析无线钓鱼攻击原理,结合准确性、稳定性、安全性和检测效率等因素提出3种钓鱼攻击AP检测技术:在服务端应用基于构建特定MAC管理帧的检测技术,在客户端应用基于路由跟踪和HDT算法的检测技术。综合使用多种检测技术可以提高检测能力,使无线校园网络保持高效稳定的运行状态,为师生提供安全可靠的服务。 With the development and popularization of wireless campus network,the wireless phishing attack is more covert and destructive.By analyzing the principle of wireless phishing attack and combining the factors of accuracy,stability,security and detection efficiency,three detection techniques of phishing AP attack are proposed,that is,the detection technology based on building specific MAC management frame is applied on the service side,and the detection technology based on route tracking and HDT algorithm is applied on the client side.The integrated use of detection technology can improve the detection capability,make the wireless campus network maintain efficient and stable operation state,and provide safe and reliable service for teachers and students.
作者 朱莉 ZHU Li(Bohai Shipbuilding Vocational College,Xingcheng 125105,China)
出处 《船舶职业教育》 2021年第1期74-77,共4页 Shipbuilding Vocational Education
关键词 钓鱼AP攻击 检测技术 无线校园网络 phishing AP attack detection technology wireless campus network
  • 相关文献

参考文献2

二级参考文献11

  • 1Song Y M,Yang C,Gu G F.Who Is Peeping at Your Passwords at Starbucks--To Catch an Evil Twin Access Point[C]//Dependable Systems and Networks,IEEE/IFIP International Conference on.IEEE,2010:323-332.
  • 2Han H,Xu F Y,Tan C C,et al.Defending against vehicular rogue APs[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:1665-1673.
  • 3Han H,Sheng B,Tan C C,et al.A Timing-Based Scheme for Rogue APDetection[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(11):1912-1925.
  • 4Han H,Xu F Y,Tan C C,et al.Defending against vehicular rogue APs[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:1665-1673.
  • 5Bratus S,Cornelius C,Kotz D,et al.Active behavioral fingerprinting of wireless devices[C]//Proceedings of the First ACM Conference on Wireless Network Security,2008:56-61.
  • 6Kim I,Seo J,Shon T,et al.A novel approach to detection of mobile rogue access points[J].Security and Communication Networks,2014,7(10):1510-1516.
  • 7齐惠英.基于EAP-TLS的WLAN安全认证[J].科技通报,2012,28(10):25-27. 被引量:1
  • 8陈伟,顾杨,于乐.高隐蔽性的无线网络主动钓鱼攻击及其防范研究[J].武汉大学学报(理学版),2013,59(2):171-177. 被引量:8
  • 9陈伟,顾杨,李晨阳,吴震雄.无线钓鱼接入点攻击与检测技术研究综述[J].武汉大学学报(理学版),2014,60(1):13-23. 被引量:23
  • 10吴松泽.关于无线网络“钓鱼”问题的研究[J].智能计算机与应用,2014,4(6):109-111. 被引量:1

共引文献4

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部