期刊文献+

无线局域网MAC层DoS攻击检测 被引量:4

Detection of DoS Based on MAC Layer of WLAN
原文传递
导出
摘要 当前对无线局域网入侵检测的研究多处于理论阶段,尚缺少检测基础平台和实验支持。文章针对基础结构模式的无线局域网,设计了一种MAC层DoS攻击的检测方法,通过实验捕捉和分析MAC层相关控制帧和管理帧,以及判断门限值,检测出MAC层存在的几种主要DoS攻击。 Nowadays, most intrusion detection research in WLAN remains on theory. In the paper, a detection method for DoS attacks based on MAC layer of WLAN is developed. In the experiment, several main DoS attacks are defined by analyzing the management and control frames of MAC layer.
出处 《信息安全与通信保密》 2008年第7期64-66,共3页 Information Security and Communications Privacy
关键词 无线局域网 MAC层 DOS攻击 检测 WLAN MAC Layer DoS attack diction
  • 相关文献

参考文献6

  • 1[1]P Nobles,P A Horrocks.Vulnerability of IEEE 802.11 WLANS to MAC Layer DoS Attack.Secure Mobile Communications Forum Exploring the Technical Challenges in Secure GSM and WLAN,2004.The 2nd IEE (Ref.N0.2004/10660)[C]. 被引量:1
  • 2[2]http://www.auscert.org.au/render.html?it=4091[DB/OL]. 被引量:1
  • 3[3]Chris Wullems,Kevin Tham,Jason Smith,el at.Technical Summary of Denial of Service Attack against IEEE 802 based Wireless LAN's[DB/OL].http://www.isi.qut.edu.au/research/publications/technical/wlan.php. 被引量:1
  • 4[4]John Bellardo,Steven Savage.802.11 denial-of-service attacks real vulnerabilities and practical solutions Proceedings of the USENIX Security Symposium,Washington D.C.,August 2003[C]. 被引量:1
  • 5夏新军,俞能海,刘洋.WLAN环境下拒绝服务攻击问题研究[J].计算机工程与应用,2005,41(25):129-132. 被引量:12
  • 6冯柳平,刘祥南,刘明业.基于数据链路层的无线入侵检测[J].桂林电子工业学院学报,2005,25(3):33-36. 被引量:3

二级参考文献19

  • 1Jason S King. An IEEE 802.11 wireless LAN security white paper[R]. U.S. Department of Energy, Lawrence Livermore National Laboratory UCRL-ID-147478,2001.10. 被引量:1
  • 2Borisov N, Goldberg I, Wagner D. Intercepting mobile communications:the insecurity of 802.11[Z]. The Seventh Annual International Conference on Mobile Computer and Networking, Rome, Italy. 2001. 被引量:1
  • 3Stubblefield A, Ioannidis J, Rubin A D. Using the fluhrer, mantin, and shamir attack to break WEP[R]. AT&T Labs Technical Report TD-4ZCPZZ, Revision 2,2001. 被引量:1
  • 4Lim Y X, Schmoyer T, Levine J, et al. Wireless intrusion detection and response[A]. Proceedings of the 2003 IEEE Workshop on Information Assurance[C]. New York: United States Military Academy, West Point, 2003.68-75. 被引量:1
  • 5Joshua Wright, GCIH, CCNA. Detecting wireless LAN MAC address spoofing[EB/OL]. http://home.jwu.edu/jwright/,2003-01. 被引量:1
  • 6John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: real vulnerabilities and practical solutions[A]. Proceedings of the 12th USENIX Security Symposium[C]. Washington, D.C., USA, 2003. 15-27. 被引量:1
  • 7Steve russel. Detecting and locating rogue access points[EB/OL].http.//www.ee.iastate.edu/~russell/cpre537.s04/ Report-Example.pdf,2003-04. 被引量:1
  • 8Tom Karygiannis, Les Owens. Wireless network security: 802.11, bluetooth, and handheld devices[R]. NIST Special Publication SP 800-48, National Institute of Standards and Technology,2002.12. 被引量:1
  • 9Wright J. Lay 2 analysis of WLAN discovery applications for intrusion detection[EB/OL]. http://home.jwu.edu/jwright/papers/12-wlan-ids.pdf, 2002-11. 被引量:1
  • 10Milner M. NetStumbler v0.4.0 release notes[EB/OL]. http://www.stumbler.net/readme/readme_0_4_0.html,2004-04. 被引量:1

共引文献13

同被引文献16

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部