Font Size: a A A

A Research Of Effectiveness Evaluation For Wireless Local Area Networks Attack

Posted on:2018-09-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiuFull Text:PDF
GTID:2348330521450295Subject:Engineering
Abstract/Summary:PDF Full Text Request
As a significant category of wireless network,WLAN obtains rapid development due to its flexibility,scalability and popularity in these years.Ubiquitous network coverage reveals its compact links with the daily life.Nevertheless the enterprises and individuals always ignore the potential dangers while enjoy the convenience brought by WLAN.Multiplicity and easy operability of attack techniques lower the attack cost,and various attacks seriously threaten the information security of the enterprises and the legitimate users.Therefore,the effectiveness evaluation of attack technology for WLAN is important technical means to detect potential threats and compressive capacity.By evaluating attack plans and the overall effectiveness,the results of quantified performance evaluation can be obtained through index data,further improving the settings of attack scenes or attack parameters.At the same time,it can reveal the security weaknesses in the WLAN environment and repair them in time.The paper firstly discusses the security profile of WLAN,and classifies the common attack methods according to the OSI model,puts forward the “signal layer-protocol layer-business layer” three-layer attack system,and introduces theoretical backgrounds related to the subsequent attacks hierarchically.Then expands the study of attacks based on WLAN.It discusses the attack principle and technology implementation in three-layer attack system.Typically,the simulation of RF interference in signal layer,wireless deception drill based on Ettercap in protocol layer and the tests about the latest vulnerabilities of NETGEAR router in business layer,to promote the comprehension of attack characteristics and attack effects,having important reference value to the establishment of evaluation index system.Subsequently the research on the effectiveness evaluation technology of WLAN attack is carried out.The main work is as follows:1.This paper proposes the effectiveness evaluation index system for WLAN attack with “network performance-system performance-security performance” criterion,the criteria layer simplifies and integrates the number of criteria and the type of indicators,taking into account the main impacts of different attacks in the WLAN three-layer attack system.2.Index weight is calculated by using K-Means clustering,and the grey clustering attack effectiveness evaluation model of quantitative index is proposed to evaluate the corresponding attack schemes under network performance and system performance criterion.Meanwhile the K-Means algorithm is used to cluster the index data to obtain the data interval,and a method of constructing the turning point of the grey clustering whitening weight function is proposed too.3.Based on the rough set theory to calculate the index weight,this paper proposes a roughness attack effectiveness evaluation model of qualitative index to evaluate the corresponding attack schemes under the security performance criterion.4.The two kinds of attack effectiveness evaluation models are integrated,and the evaluation software of WLAN attack based on rough set is designed and developed to realize the automatic evaluation of attack schemes.Finally,the network performance criterion layer uses OPNET Modeler to build the simulation environment,taking the NAV Spoofing attack as an example.The system performance criterion layer uses the index data of router facing the wireless DOS attack in case evaluation.The security performance criterion layer is based on the possible attack plans for performance evaluation and security risks feedback.The evaluation effect of each criterion layer fully validates the effectiveness of the proposed attack effectiveness evaluation model.
Keywords/Search Tags:Wireless Local Area Networks, Three-layer attack system, Evaluation index system, Rough set, Grey clustering
PDF Full Text Request
Related items