您现在的位置:首页 > 知识库 > 电子信息 >802.11无线局域网应用中的安全攻击防护策略的研究
802.11无线局域网应用中的安全攻击防护策略的研究

802.11无线局域网应用中的安全攻击防护策略的研究

资料大小: 30.47 MB
文档格式: PDF文档
资料语言: 简体中文
资料类别: 电子信息
更新日期: 2020-03-27
下载说明:
推荐信息: 防护   策略   攻击   中的   应用

本地下载(30点)  备用下载(30点)

内容简介
802.11无线局域网应用中的安全攻击防护策略的研究
出版时间:2016年版
内容简介
  《802.11无线局域网应用中的安全攻击防护策略的研究》主要从如何解决信息化应用中的信息泄露问题,如何避免802.11无线拒绝服务攻击两个方面来对无线安全问题进行深入研究。在研究成果的基础上,进一步探讨了安全高效802.11无线通信技术在不同领域的应用。
目录
CHAPTER 1 Introduction
1.1 Motivations
1.2 Crypto attacks on WLANs
1.2.1 Traffic analysis
1.2.2 Eavesdropping
1.2.3 Man-in-the-middle
1.2.4 Session hijack
1.2.5 Masquerading
1.2.6 Unauthorized access
1.2.7 Replay(or Playback)
1.2.8 Tampering
1.2.9 Forgery
1.3 Approaches to resolve crypto attacks
1.3.1 Wired equivalent privacy
1.3.2 802.11i (TKIP, CCMP)
1.3.3 VPN solution against crypto attacks
1.4 Denial of service (DOS)
1.5 Related DoS research work
1.6 Proposed approaches and contributions
1.6.1 Contributions to resolve crypto attacks
1.6.2 Contributions to resolve DoS attacks
1.7 Outline

CHAPTER 2 Experimental Methodologies
2.1 Summary of tools
2.1.1 Pcattep
2.1.2 WireShark
2.1.3 FreeRadius server
2.1.4 HostAP
2.1.5 Voidll attacking tool
2. 1.6 Wireless sniffer
2.1.7 Network simulation
2.2 Performance measurements
2.2. l TCP throughput
2.2.2 Round trip time
2.2.3 TCP time-sequence graph
2.2.4 UDP throughput and packet loss
2.3 Experimental design
2.3.1 Network emulation of AuthRF and AssRF attacks
2.3.2 Network emulation of DeauthF/DisassF attacks
2.4 Queuing model

CHAPTER 3 Protect Wireless LANs using VPN over 802.11i
3.1 Introduction
3.2 Five S problems of enterprise WLANs
3.2.1 Security attacks on wireless communication (SAOWC)
3.2.2 Stealing wireless resources (SWR)
3.2.3 Sniffing internal traffic (SIT)
3.2.4 Sharing internal resources (SIR)
3.2.5 Security backward compatibility (SBC)
3.2.6 Summary of 5S problems
3.3 Security approaches for five S problems
3.3.1 WEP
3.3.2 WEP-802.1X
3.3.3 VPN/WEP-802.X

CHAPTER 4 AuthRF and AssRF DoS Attacks
CHAPTER 5 DeauthF and DisassF Attacks
CHAPTER 6 RAP DoS Attacks with Markov Chain Model
CHAPTER 7 DoS Attacks against Wireless VolP
CHAPTER 8 Layer-3 Forwarding on Wireless LANs
CHAPTER 9 Wireless Device Server Based Sensor Management Systems
CHAPTER 10 Summary of Contributions and Future Works