Nowdays, WLAN (wireless LAN) is entering the popularization and large-scale stage because of its advantages such as low-cost and convenience in accessing, and people are favor in this technology day by day. With the development of WLAN, many attackers are also interested in this new field. Due to the specific mobile characteristics of WLAN, limited computing resources and power resources and so on, attacks on WLAN are more and more, and the harmfulness the attacks causing is more serious than other attack.Of course, more and more attacks on WLAN have been attracting many experts' attention. IEEE workgroup has developed IEEE 802.11i protocol according to the characters of WLAN, and the protocol has been the security standard after accreditation on 2004. However, because of the characters of Denial of Service attacks, such as easy implementation, difficult track, and flexible means, that is, it can be attacker as an illegal users or legitimate users. Therefore, the security protocol can't cope with and resolve the problems of WLAN Denial of Service attacks. So, studyint on different attack methods and the defense methods are very importment.This paper analysis the WLAN working environment, introduces various protocols and working methods in different environments and configurations. At the same time, it compares and analysis the existing security protocols and defensive methods for Denial cf Service attacks. And then the author simulates the attacks using the OPNET software, and showd the tremendous harm to WLAN in specific data. Finally the paper puts forward its own method—three-dimensional defense model against the Denial of Service attack, and the author descripes the methods in the way of the formal description. |