wifi接入安全监控系统的分析word论文.docxVIP

  • 11
  • 0
  • 约3.14万字
  • 约 43页
  • 2018-02-08 发布于上海
  • 举报

wifi接入安全监控系统的分析word论文.docx

wifi接入安全监控系统的分析word论文

In recent years, with the development of Internet and rapid increase of information transmission, big data as the main characteristics of network structure is becoming more and more highlighted. At the same time, the network is a double-edged sword, it is convenient in our daily work, enriches our life and also facilitates the hackers. Hackers can not only use sniffing attacks to steal account information of others, but also can obtain sensitive information about others through the erection of a Wifi hot spot for fishing. Therefore, how to quickly judge and excavated abnormal flow of the wireless network is particularly important.In order to protect the user’s security of the wireless network environment, this paper presents a Wifi network security monitoring system environment. First of all, we can guarantee access security of users through the VPN cluster. Then, by adding a security gateway between the user and Wifi, we can ensure the safety of users through the traffic detection. Combine with the method of worm feature matching and the global kmeans algorithm based on PSO, we can detect the most of attacks from the Wifi environment effiectively.Key words:Wifi, NetFlow, Deep packet, PSO, Global Kmeans, Spectral clustering第一章 绪论...............................................................................................................................11.1 研究背景与意义......................................................................................................... 11.2 国内外研究现状......................................................................................................... 11.3 论文主要内容和结构安排......................................................................................... 2第二章 相关技术与理论...........................................................................................................42.1 相关安全事件............................................................................................................. 42.1.1 ARP 欺骗42.1.2 蠕虫病毒特征分析............

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档