Font Size: a A A

The Research Of Intrusion Detection Technology On WLAN

Posted on:2009-08-05Degree:MasterType:Thesis
Country:ChinaCandidate:W G WangFull Text:PDF
GTID:2178360272473417Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
IDS (Intrusion Detection) is that the act of invasion. It passed from the computer network or computer system to collect key information and analysis, which found that the network system or whether there is a breach of security policy and the attacks were a sign that the system of running their targets and found all kinds of attempts to attack, Attacks or results of the attack to ensure that the resources of the system confidentiality, integrity and availability. As the protection of computer systems and networks in an important technology, intrusion detection through the rational deployment and configuration, can discover and report unauthorized or system anomalies. Intrusion detection to real-time monitor system, to find real-time attacks and take measures to prevent attacks or minimize the development of the harm caused by the attack. With the wireless local area network (WLAN) applications continued to deepen, based on wireless local area network intrusion detection system more and more attention.In this paper, in-depth study of intrusion detection technology in the WLAN application, and ultimately a WIN32-based wireless intrusion detection system to resolve issues such as illegal unauthorized access, DOS attacks, and other security issues.Firstly, wireless network security technologies, security threats and attacks against the main attack techniques are discussed in the paper. Secondly, because of pcap can not capture the frame of management and control, based on the proposed direct access to the wireless network card driver of the MAC wireless data capture method, this method in the Windows environment to be able to capture frame of management and control. And then using pattern-matching detection algorithm to achieve a simple wireless local area network intrusion detection system ( WINDS ) . Finally, in a laboratory environment, were tested to detect wireless local area network to attack some of the specific (such as the counterfeiting attacks, DOS attacks, etc.) and report to the police.
Keywords/Search Tags:Wireless Local Area Network(WLAN), Intrusion Detection, Access Point(AP), MAC Address Rogue, SSID
PDF Full Text Request
Related items