基于wlan嗅探攻防的安全技术分析-analysis of security technology based on wlan sniffing attack and defense.docxVIP

  • 5
  • 0
  • 约6.25万字
  • 约 64页
  • 2018-05-18 发布于上海
  • 举报

基于wlan嗅探攻防的安全技术分析-analysis of security technology based on wlan sniffing attack and defense.docx

基于wlan嗅探攻防的安全技术分析-analysis of security technology based on wlan sniffing attack and defense

ABSTRACTWith WLAN terminal is widely used in the modern network deployment, network security issues caused by WLAN’s security flaws are also increasingly imminent. Sniffing brings more serious harm to information security because of the broadcast nature of WLAN signal. However, the current study about WLAN security technique specifically for wireless sniffer is few. Thorough analysis of wireless network sniffing attacks will be a key to analyse the general process of the actual attack, research the impliment of effective defense and guarantee information security.Therefore, this paper proposes a research system of WLAN security technology specifically for wireless sniffer, which develops from the attack, defense and evaluation respectively. Firstly, according to the ultimate intentions of sniffing attackers and the distribution of user information density in the network, the attacking subsystem is implemented to show the process of the actual attack to a WLAN and the weak link of WLAN security technology. Then, though the analysis of the traditional method of network defense, encrypting is proved to be the essence of defensing sniffing. And the EAP-OIT algorithm is designed by adopting the existing EAP authentication algorithms’ strong points while overcoming others weak points to improve, which is used to strengthen the protection of information in order to achieve the function of defensing sniffers. Finally, combining AHP and TOPSIS algorithm, a security evaluation system of WLAN is summed up to assess security risk of the actual network in different types.As a result, the attacks experiment proves that the attack subsystem can break the WLAN defense method in a short time and success in deciphering the HTTP protocol packets which carry information, that displays the vulnerability of the WEP and WPA encrypted form and the Pre-share Key authentication. For the defense subsystem, it’s proved through comparative analysis theoretically that the EAP-OIT algorithm has t

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档