期刊文献+

无线局域网安全技术分析与改进 被引量:9

Security technology of wireless local area network
下载PDF
导出
摘要 从加密、认证、密钥管理和入侵检测四个方面分析了无线局域网的安全技术.在加密、认证和密钥管理方面重点分析了最新的无线局域网协议标准802.11i,并介绍了中国的无线局域网协议标准WAPI.在入侵防御方面分析了现有的主要入侵方法,并提出了无线局域网的入侵检测框架. With the widely utilize of wireless network, the security becomes a very important issue in wireless LAN technclogy. The paper analyses wireless security technologies: encryption, authentication, key management strategies, and intrusion detection. In encryption, authentication, and key management strategies more attentions are pained to 802. lli and our country's wireless LAN protocols standard WAPI. In intrusion avoidance field, some famous attacks against wireless LA.N are introduced. Last, an intrusion detection architecture for wireless LAN is put forward.
出处 《东北师大学报(自然科学版)》 CAS CSCD 北大核心 2006年第3期44-49,共6页 Journal of Northeast Normal University(Natural Science Edition)
基金 国家自然科学基金资助项目(60473042)
关键词 无线局域网 加密 认证 密钥管理 入侵检测 wireless LAN encryption authentication key management intrusion detection
  • 相关文献

参考文献12

  • 1FLUHRER S,MARTIN I,SHAMIR A.Weaknesses in the key scheduling algorithm of RC4[A].Lecture Notes in Computer Science[C].London:Springer-Verlog,2001:1-20. 被引量:1
  • 2IEEE 802.11,Temporal key hash[S]. 被引量:1
  • 3DAEMEN J,RIJMEN V.The design of Rijndael[M].New York:Springer-Verlag,2002:255. 被引量:1
  • 4GUPTA V,KRISHNAMURTHY S,FALOUTSOS M.Denial of service attacks at the MAC layer in wireless ad hoc networks[DB/OL].http://citeseer.ist.psu.edu/update/543762,2002. 被引量:1
  • 5D CHEN,DENG J,VARSHNEY PK.Protecting wireless networks against a denial of service attack based on virtual jamming[DB/OL],http://citeseer.ist.psu.edu/update/675827,2003. 被引量:1
  • 6BELLARDO J,SAVAGE S.802.11 Denial-of-service attacks:real vulnerabilities and practical solutions.[DB/OL].http://www.cs.ucsd.edu /users /savage/papers /UsenixSec03.pdf,2003/200407. 被引量:1
  • 7THEUNS V,RAY H.Intrusion detection techniques and approaches[J].Computer Communication,2002,25(15):1 356-1 365. 被引量:1
  • 8卿斯汉,蒋建春,马恒太,文伟平,刘雪飞.入侵检测技术研究综述[J].通信学报,2004,25(7):19-29. 被引量:234
  • 9LIM Y X,SCHMOYER T,LEVINE J,et al.Wireless intrusion detection and response[A].Proceedings of the 2003 IEEE Workshop on Information Assurance[C].New York:West Point,2003.68-75. 被引量:1
  • 10KYASANUR P,VAIDYA N.Detection and handling of MAC layer misbehavior in wireless networks[A].2003 International Conference on Dependable Systems and Networks[C].San Francisco:IEEE Computer Society,2003.173-182. 被引量:1

二级参考文献46

  • 1LEE W,STOLFO S,MOK K. A data mining framework for adaptive intrusion detection[EB/OL]. http://www.cs.columbia.edu/~sal/ hpapers/framework.ps.gz. 被引量:1
  • 2LEE W, STOLFO S J, MOK K. Algorithms for mining system audit data[EB/OL]. http://citeseer.ist.psu.edu/lee99algorithms.html. 1999. 被引量:1
  • 3KRUEGEL C, TOTH T, KIRDA E.Service specific anomaly detection for network intrusion detection[A]. Proceedings of the 2002 ACM Symposium on Applied Computing[C]. Madrid, Spain, 2002. 201-208. 被引量:1
  • 4LIAO Y, VEMURI V R. Use of text categorization techniques for intrusion detection[A]. 11th USENIX Security Symposium[C]. San Francisco, CA, 2002. 被引量:1
  • 5An extensible stateful intrusion detection system[EB/OL]. http://www.cs.ucsb.edu/~kemm/NetSTAT/doc/index.html. 被引量:1
  • 6ILGUN K. USTAT: A Real-Time Intrusion Detection System for UNIX[D]. Computer Science Dep University of California Santa Barbara, 1992. 被引量:1
  • 7The open source network intrusion detection system [EB/OL]. http://www.snort.org/. 被引量:1
  • 8KO C, FINK G, LEVITT K. Automated detection of vulnerabilities in privileged programs by execution monitoring[A]. Proceedings of the 10th Annual Computer Security Applications Conference [C]. Orlando, FL: IEEE Computer Society Press, 1994. 134-144. 被引量:1
  • 9Computer security & other applications of immunology[EB/OL]. http://www.cs.unm.edu/~forrest/isa_papers.htm. 被引量:1
  • 10GRUNDSCHOBER S. Sniffer Detector Report[R]. IBM Research Division Zurich Research Laboratory Global Security Analysis Lab, 1998. 被引量:1

共引文献233

同被引文献67

引证文献9

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部