Font Size: a A A

Wireless Intrusion Detection Systems In The Network Of National Tax

Posted on:2007-12-04Degree:MasterType:Thesis
Country:ChinaCandidate:Y HeFull Text:PDF
GTID:2208360185956105Subject:Software engineering
Abstract/Summary:PDF Full Text Request
IDS is an important part of the main net-protection system. IDS is a kind of active safeguard measure of net-protection, it collects information actively from the inside of system and various network resources, from which analyses the possibility of being invaded and attacked.IDS offers an extra safe defense-line for supporting wireless network. After introducing wireless access ability for the network, the security risk of the network will increase notably too. The protection of fire-wall and VPN may be not enough.Therefore, conducting the research to the wireless IDS, and carrying on the correct installment, the disposition and the deployment appears especially important.As a result of its own characteristics, the wireless network faces with more serious threats than the wired network, such as : being wiretapped easily, being detected difficultly, being disturbed by high-power easily ,being attacked by inserting easily ,being attacked by'DoS'easily, the camouflage of mobile communication's radio station and the auditing and management problems brought by mobile roaming .The high error rate of wireless channel limits some applications of encryption algorithms.Under the mentor's instruction, by consulting many kinds of materials, with the work experiences, the author think that if we will study the wireless IDS, we must study the wireless intrusion first, and then study the IDS. We must study not only the software of wireless network but also the hardware of wireless network.Therefore, the first chapter of the present paper begins from the wireless network safe threat, and briefly introduces the IDS'duties. The Second chapter briefly introduces the hardware equipment of wireless network, because the disposition and the use of the hardware equipment also affect the wireless network's security seriously. The third chapter in detail introduces the wireless network transmission agreement 802.11 standard. Then the next single chapter briefly introduces the WEP's security, because WEP is the data protection mechanism which 802.11 standard provides, but this kind of mechanism has some flaws by which creates many security problems. Then the writer introduces the process of hackers attacking wireless network and the using tools by hackers, because only after we know how the enemy "do attack", we can know how "guard against" as far as possible. In the sixth chapter, the IDS as well as its weakness and development tendency are introduced in detail. In the last chapter, based on the work experiences, as a network system administrator in The National Taxation Bureau, the writer introduces the application of wireless network in the National Taxation computer network as well as some security measures, and points out the executing plans which should be adopted.The writer really hope that the research to the wireless IDS can help the interior computer network safekeeping of National Taxation Department.
Keywords/Search Tags:network security, wireless intrusion, detection system
PDF Full Text Request
Related items