Font Size: a A A

Study On Denial Of Service Attack Simulation And Defension For WLAN

Posted on:2009-01-02Degree:MasterType:Thesis
Country:ChinaCandidate:P J TangFull Text:PDF
GTID:2178360278971154Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Nowdays, WLAN (wireless LAN) is entering the popularization and large-scale stage because of its advantages such as low-cost and convenience in accessing, and people are favor in this technology day by day. With the development of WLAN, many attackers are also interested in this new field. Due to the specific mobile characteristics of WLAN, limited computing resources and power resources and so on, attacks on WLAN are more and more, and the harmfulness the attacks causing is more serious than other attack.Of course, more and more attacks on WLAN have been attracting many experts' attention. IEEE workgroup has developed IEEE 802.11i protocol according to the characters of WLAN, and the protocol has been the security standard after accreditation on 2004. However, because of the characters of Denial of Service attacks, such as easy implementation, difficult track, and flexible means, that is, it can be attacker as an illegal users or legitimate users. Therefore, the security protocol can't cope with and resolve the problems of WLAN Denial of Service attacks. So, studyint on different attack methods and the defense methods are very importment.This paper analysis the WLAN working environment, introduces various protocols and working methods in different environments and configurations. At the same time, it compares and analysis the existing security protocols and defensive methods for Denial cf Service attacks. And then the author simulates the attacks using the OPNET software, and showd the tremendous harm to WLAN in specific data. Finally the paper puts forward its own method—three-dimensional defense model against the Denial of Service attack, and the author descripes the methods in the way of the formal description.
Keywords/Search Tags:WLAN, DoS attack, OPNET Simulation, Three-Dimensional Defense
PDF Full Text Request
Related items