期刊文献+

无线局域网入侵检测系统的研究

Researching of the WLAN' S IDS
下载PDF
导出
摘要 入侵检测系统对于保障无线局域网(WLAN)安全十分重要。在深入分析当前WLAN安全问题中面临的主要问题后,针对无线局域网的特点,提出并实现了一个分布式无线入侵检测系统。首先对无线局域网网络结构和主要安全技术进行了分析,阐述了入侵检测技术在无线局域网安全体系结构中的重要作用以及目前入侵检测技术存在的主要问题。然后在WLAN环境下实现了一个分布式无线入侵检测系统。研究了诸如winpcap网络数据包捕获技术,多模式匹配算法中的自动机匹配算法及统计分析算法等具体实现技术。 Intrusion detection systems are one of the important ways to protect the security of wireless local area networks (WLANS).A new distribution wireless intrusion detection system is presented according to thecharacteristics of WLAN. At the beginning this dissertation analyzes networks tructure and several main security technologies,followed by the importance of intrusion detection technology in WLAN' s security system,and the defects in the existing intrusion detection technology.In the second part,a distribution wireless intrusion detection system is realized.Several technologies,such as Wincap network data packets capture technology,AC automaton matching algorithm ,are exploited to implement each module of the intrusion detection system. Stasistic analysis method is used in the system too.
作者 张秀 ZHANG Xiu (Nanyang Branch of China Netcom Group Ltd. ,Nanyang 473000,China )
出处 《电脑知识与技术》 2007年第3期1247-1248,1278,共3页 Computer Knowledge and Technology
关键词 无线局域网 网络安全 入侵检测 分布式系统 Wireless LAN network security Intrusion Detection Distribution system
  • 相关文献

参考文献6

二级参考文献11

  • 1Boyer R S,J S Moore.A fast string searching algorithm[J].Communications of the ACM,1977;20:762-772. 被引量:1
  • 2S Wu,U Manber.A fast algorithm for multi-pattern searching[R].Technieal Report TR-94-17,University of Arizona,1994. 被引量:1
  • 3K G Anagnostakis,E p Markatos.E2xB:A domainspeciflc string matching algorithm for intrusion detection[C].In:Proceedings of the 18th IFIP International Information Security Conference,2003. 被引量:1
  • 4Aho A,Corasick M.Efficient string matching:an aid to bibliographic search[J].Comm ACM, 1975;18:33-40. 被引量:1
  • 5Martin Roesch.Snort-lightweight intrusion detection for networks[C]. In:Proceedings of the 13th System Administration Conference,USENIX, 1999. 被引量:1
  • 6MIT Lincoln Labs.DABPA Inttusion Detection Evaluation[DB].http://www.ll.mit.edu/IST/ideval, 1999. 被引量:1
  • 7IEEE Standard Committees. ANSI/IEEE Std 802.11, Part Ⅱ: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)Specifications.http://www.cce.utep.edu/Faculty /webtyao/ee5 390/11a.pdf, 1999 被引量:1
  • 8Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer. ist. psu.edu/context/65327/0 - 36k, 1990 被引量:1
  • 9Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols for Multi-hop Wireless ad Networks. IEEE Journal on Selected Areas in Communications, 1999(8): 36-41 被引量:1
  • 10Miller S K. Facing the Challeuge of Wireless Secruity. IEEE Computer Magazine, 2001 ,(7): 16-18 被引量:1

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部