Font Size: a A A

Research Of The Security Technology Based On WLAN Sniffer Attack And Defense

Posted on:2015-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:S T YuFull Text:PDF
GTID:2298330452959033Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
With WLAN terminal is widely used in the modern network deployment, networksecurity issues caused by WLAN’s security flaws are also increasingly imminent.Sniffing brings more serious harm to information security because of the broadcastnature of WLAN signal. However, the current study about WLAN security techniquespecifically for wireless sniffer is few. Thorough analysis of wireless network sniffingattacks will be a key to analyse the general process of the actual attack, research theimpliment of effective defense and guarantee information security.Therefore, this paper proposes a research system of WLAN security technologyspecifically for wireless sniffer, which develops from the attack, defense andevaluation respectively. Firstly, according to the ultimate intentions of sniffingattackers and the distribution of user information density in the network, the attackingsubsystem is implemented to show the process of the actual attack to a WLAN andthe weak link of WLAN security technology. Then, though the analysis of thetraditional method of network defense, encrypting is proved to be the essence ofdefensing sniffing. And the EAP-OIT algorithm is designed by adopting the existingEAP authentication algorithms’ strong points while overcoming other’s weak points toimprove, which is used to strengthen the protection of information in order to achievethe function of defensing sniffers. Finally, combining AHP and TOPSIS algorithm,a security evaluation system of WLAN is summed up to assess security risk of theactual network in different types.As a result, the attacks experiment proves that the attack subsystem can break theWLAN defense method in a short time and success in deciphering the HTTP protocolpackets which carry information, that displays the vulnerability of the WEP and WPAencrypted form and the Pre-share Key authentication. For the defense subsystem, it’sproved through comparative analysis theoretically that the EAP-OIT algorithm has thefunction of resisting sniffer and protecting key material effective due to the features ofmutual authentication and temporary of keys. For the evaluation subsystem, WLANsof different types is modeled to carry out the expected risk that shows the evaluationalgorithm is reasonable.
Keywords/Search Tags:WLAN, Sniffer Attack, EAP Authentication, Security Assessment
PDF Full Text Request
Related items