Font Size: a A A

The Research Of Intrusion Detection System Based On Wireless Network

Posted on:2007-07-28Degree:MasterType:Thesis
Country:ChinaCandidate:X ZhangFull Text:PDF
GTID:2178360182980802Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Network technology is developing flourishingly recently, it doesn't localize in wired framework, wireless network is a focus that is concerned about by people in pursueing automatization age. Wireless network is convenient and fast.The issuance of Intel technology makes the concept of "wireless, limitless" penetrate with people's heart more and more. At the same time the coming of wireless network bring new security problem to IT. Because many traditional security way is not fit in with WLAN. For example, it is difficult to control user to access wireless network by firewall and agent server. Because a wireless access point is public to all inside user, intruder and distrustful user can enter wireless network to access all kinds of source easily. With the ceaseless improvement of Hacker's intrusion skill and the enlarging increasingly of attack area, information security has became a important problem concerning with information system.The function of Ideal IDS include watching and analyzing the action of user and system, auditing configuration and leak of system, evaluating susceptive and integrality of data, distinguishing from attack action, Statisticing unconventional action, collecting automatically mend that is interrelated with system, auditing, following and distinguishing from action that disobey security strategy, making log to record Intrusion action and so on. But existing IDS is not fit in with WLAN. Currently it is at the testing moment to detect the Intrusion to WLAN, for example, IDS-Snort that open source code has issued alpha stage Snort-wireless, this edition add Wi-F protocol field and optional keyword, adopt rule-suited way to detect Intrusion, its AP is configured handmadely by Administrator, so it can distinguish from fake AP, and we needs reconfigure it when we extend AP. Because these regular files have not effective rule to define, its detection function is limited and it can not detect these attack including MAC address disguise and flooding service resistance.At first this article introduces the concept and class of wireless network, compares security to wired network, and summarizes existent security risk of wireless network. Then this article research protocol of WLAN, introduceemphatically ffiEE802.11bx IEEE802.11i and Chinese WAPI protocol, and compare and analyse their excellence and defect. Subsequently this article introduce the concept and taxonomy, and introduce some intelligentize Intrusion briefly Detection way including NN, distributed disposal technology;more research concept system framework of wireless IDS. And then design some pivotal module to realize wireless IDS, including data collecting module, protocol decoding module, pretreatment module, detection and analyse module, rule parsing module and so on. At last based on developmental direction of computer and wireless network technology, this article expect wireless IDS.
Keywords/Search Tags:Wireless Network, Intrusion Detection System, Security protocol
PDF Full Text Request
Related items