详细信息
802.11无线局域网入侵检测技术的研究与应用
Research and Application of Intrusion Detection on 802.11 Wireless Local Area Network
文献类型:期刊文献
中文题名:802.11无线局域网入侵检测技术的研究与应用
英文题名:Research and Application of Intrusion Detection on 802.11 Wireless Local Area Network
作者:张银霞[1];李育芳[1]
第一作者:张银霞
机构:[1]北京联合大学师范学院电气信息系
第一机构:北京联合大学师范学院
年份:2010
卷号:23
期号:11
起止页码:46-49
中文期刊名:电脑开发与应用
外文期刊名:Computer Development & Applications
语种:中文
中文关键词:无线局域网(WLAN);协议分析;入侵检测
外文关键词:wireless local area network(WLAN); protocol analysis; intrusion detection
摘要:无线局域网(WLAN)因其无线信道的特殊性,较传统有线网更易受到攻击。入侵检测是较主动的安全监控技术,能防止外部的入侵还能检测内部的非法使用。研究将入侵检测应用于WLAN,将会提高WLAN的主动防御能力。据WLAN工作协议IEEE802.1的特点,选择其媒体接入MAC层和LLC层的关键字段作入侵检测的分析对象,提出了WLAN下入侵检测数据包捕获和入侵分析方法。针对WLAN不同类别的入侵检测事件进行了入侵检测方案设计。对经典入侵工具NetStumbler、Wellenreiter的入侵机理进行分析,找到了入侵检测的方法。据WLAN的两种基本工作模式,提出了基于主机检测和网络检测相结合的分布式入侵检测模型,并给出了实现的模块框架图。结合实例的WLAN入侵检测方案设计具有较强的针对性和实用性。
Wireless Local Area Network(WLAN)suffers from attack more easily than the traditional wired network,because of the particularity of its wireless channel.Intrusion Detection is a more relatively active technology for security monitoring and control,can not only prevent the outside intrusion but also detect the inside illegal using.Researching how to use Intrusion Detection into WLAN will advance the proactive detection ability of WLAN.According to the features of WLAN's working protocol IEEE802.1,it chooses the key fields of Medium Access Control(MAC) and Logic Link Control(LLC) of WLAN as the analytical objects of Intrusion Detection,and come up with the methods of capturing data packets and intrusion analysis.For the different kinds of events of Intrusion Detection,it brings up the solution designs of Intrusion Detection.It analyses invasive mechanism of the classical intruding tools,NetStumbler and Wellenreiter,and finds the methods of Intrusion Detection.As the two basic work patterns of WLAN,it brings forward the distributed model of Intrusion Detection on the basis of the combine of host detecting and network detecting,and offers the frame pictures of the realized modules.The solution design of combing example of WLAN Intrusion Detection has stronger pertinency and practicability.
参考文献:
正在载入数据...