Font Size: a A A

Phishing Attack And Detection Design For Wireless Access Point

Posted on:2017-03-08Degree:MasterType:Thesis
Country:ChinaCandidate:Y S LiFull Text:PDF
GTID:2308330488964006Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Local Area Networks WLAN:Wireless (wireless local area network) as an effective mobile Internet access technology, has been widely used in daily life. There are many implementations of WLAN, among which the most widely used is Wi-Fi, because it can eliminate the difference of each terminal. With the rise of intelligent mobile devices, people rely on the gradual deepening of WI-FI, WI-FI has been an integral part of the mobile internet. Through the portable terminal equipment, people can use the wireless Wi-Fi to facilitate quick access to the Internet into the social, browse the web, online shopping and even games and other activities.However, with the establishment of a large-scale wireless access point in the life of a variety of occasions, the wireless local area network security has become particularly prominent and important. Due to the vulnerability of IEEE 802.11 protocol itself, there are a large number of WLAN attacks for. Hackers can attack WI-FI anywhere in the area covered by the wireless signal, which is one of the serious security threats in the wireless network, which is the wireless phishing access point (AP). Wireless access point of phishing attacks that hackers use wireless devices and simulate a fake AP, the configuration and the real AP with exactly the same of the performance index and attribute, the victims can not determine the true and false, so as to delay even counterfeit wireless access point immediately into further development to steal passwords and other attacks. Wireless phishing AP is called an illegal access point, not because it is not deployed by government agencies or operators, but because the purpose of the arrangement of this device is to steal confidential information, resulting in damage. This attack is difficult to be tracked, because the attacker to start and close the device has a sudden and random, they get the target is also very short duration. An attacker can through the deployment of equipment can initiate the attack, such as launching wireless DOS attack blocking normal connection or the "man in the middle attacks to steal secrets, using Wi-Fi automatic reconnection mechanism of user fishing. Intelligent terminal in most existing wireless hotspot scenarios will choose to connect wireless hotspot to improve the speed of the network connection, but the safety and reliability of the wireless hotspots cannot effectively judgment and recognition, once access malicious phishing wireless hotspots may lead to leaks in the terminal data leakage or important information, to information security of users bring great threat.Aiming at false hot and fishing hot spots to steal user information, at present major domestic mobile terminal detection methods mostly stay at this stage in encrypted attributes the name to detect hot spots and hot, known as the fingerprint feature detection. This detection method is practical and easy to be attacked by attackers. In order to ensure the security of wireless access, it is necessary to make more active and effective way to make reference to the wireless security environment in addition to the characteristics of wireless hot spots. Based on active detection wireless phishing detection techniques can be applied to mobile terminal equipment, according to the wireless AP SSID, MAC address, IP address, encryption way four characteristic fingerprint detection, for private Wi Fi and operators of public Wi Fi design different active probing scheme can enable phishing detection more accurate, make people more at ease to enjoy the convenience brought by wireless network. In summary, the research on wireless security detection technology should have broad application prospects and great practical value.
Keywords/Search Tags:WLAN, Rogue, Wi-Fi, Detection
PDF Full Text Request
Related items