Font Size: a A A

Design And Implementation Of Wireless Network Attack Detection System Based On WiFi Technology

Posted on:2021-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:P LuFull Text:PDF
GTID:2428330632462657Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the technology of WiFi developing,wireless hotspots can be accessible everywhere,such as restaurants,stations,residences.But at the same time,there are also many security issues.With simple devices,some attacks,which are wide and hard to detect,can be realized.Therefore,it is very important to detect attacks in wireless networks.In this dissertation,some common security threats are introduced in wireless networks,attack methods and attack principles are analyzed,attack detection methods are studied.Based on existing work and achievements at home and abroad,design and implement a WiFi-based wireless network attack detection system.The main work is as follows:(1)Analyze and design a wireless network attack detection system.By analyzing the shortcomings of traditional wireless network attack detection system,to conclude,the WiFi-based wireless network attack detection system needs to have data acquisition and preprocessing,wireless device detection,position adaptation,fake access point detection,denial of service attack detection,attack blocking,attack localization,statistics and system settings functions.Based on these functions,analyze the goals that the system needs to achieve,divide functional modules and design system architecture.(2)Design and implement a wireless network attack detection system in detail.At first,design a whitelist fingerprint library with a variety of features including the media access control address,sequence control number and received signal strength indication.Then,summarize the characteristics of denial of service attacks and improve the threshold calculation method with considering time.At last,aimed at the shortcomings of the traditional attack detection system,the information of other APs in the environment are applied in this system to realize the adaptation of the detection device's position change.Therefore,the system can continue to run during and after the detection device moves,and can automatically update part of the fingerprints after the movement.At last,implement attack localization with received signal strength.(3)Test the wireless network attack detection system.Set a variety of attack scenarios and simulate fake access point attack,authentication flood attack,de-authentication flood attack,beacon flood attack and disassociation flood attack.Demonstrate the attack method and system workflow and test the seven main functions.
Keywords/Search Tags:wireless security, fake access point detection, wireless denial of service attack, WiFi localization
PDF Full Text Request
Related items