Linux 是目前使用十分广泛、流行的网络操作系统,随着网络服务器对安全性要求的不断增大,如何有效地防御针对 Linux 服务器的入侵和攻击已成为系统管理员不容忽视的问题。该文针对 Linux 服务器存在的几类安全问题, 给出了一些增强 Lin...Linux 是目前使用十分广泛、流行的网络操作系统,随着网络服务器对安全性要求的不断增大,如何有效地防御针对 Linux 服务器的入侵和攻击已成为系统管理员不容忽视的问题。该文针对 Linux 服务器存在的几类安全问题, 给出了一些增强 Linux 服务器安全性的实用配置经验和技巧、常用的入侵检测方法以及遭受入侵后应采取的措施。展开更多
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authenti...Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authentication in 802.11i is given via a belief multisets formalism. The analysis shows that the 4-way handshake and the group key handshake may provide satisfactory mutual authentication, key management, and issue of a new group temporal key from an access point to a user device, under the guarantee of mutual possession of a confidential palrwise master key. The analysis also shows that there exists a denial of service attack in the 4-way handshake and some seeming redundancies are useful in the protocol implementation.展开更多
文摘Linux 是目前使用十分广泛、流行的网络操作系统,随着网络服务器对安全性要求的不断增大,如何有效地防御针对 Linux 服务器的入侵和攻击已成为系统管理员不容忽视的问题。该文针对 Linux 服务器存在的几类安全问题, 给出了一些增强 Linux 服务器安全性的实用配置经验和技巧、常用的入侵检测方法以及遭受入侵后应采取的措施。
基金the National High Technology Research and Development Program(863)of China(No.2006AA01Z422)the National Natural Science Foundation of China(Nos.60573030,90704004)
文摘Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authentication in 802.11i is given via a belief multisets formalism. The analysis shows that the 4-way handshake and the group key handshake may provide satisfactory mutual authentication, key management, and issue of a new group temporal key from an access point to a user device, under the guarantee of mutual possession of a confidential palrwise master key. The analysis also shows that there exists a denial of service attack in the 4-way handshake and some seeming redundancies are useful in the protocol implementation.