Font Size: a A A

Design And Implementation Of WLAN Security Monitoring System

Posted on:2022-09-22Degree:MasterType:Thesis
Country:ChinaCandidate:H HuangFull Text:PDF
GTID:2518306332967209Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Due to the rapid development of Internet communication technology,the ways to connect to the Internet are becoming more and more diversified.As an important way to connect to the Internet,WLAN has changed the situation of Internet communication only relying on wired networking technology.With the rapid development of WLAN technology and the large-scale popularization of wireless terminal equipment,WLAN has been widely used in campus,subway,shopping malls and other public places with large traffic.Wireless local area network brings convenience to people's communication,at the same time,the security risk can not be ignored.In recent years,attacks on WLAN have caused property losses to users,so it is particularly important to identify the security threats in WLAN.This thesis designs and implements a WLAN security monitoring system.Firstly,the WLAN security monitoring system is designed.Then the specific functions of the system are realized.Finally,the system security monitoring related functions are tested,the test results show that the system wireless device detection,fake AP attack monitoring and DOS attack monitoring have high accuracy,router vulnerability monitoring can also accurately identify specific vulnerability information.The specific research contents of this thesis are as follows:(1)The wireless LAN security monitoring system is designed.First of all,the function of traditional WLAN security monitoring system is deeply analyzed.It is concluded that WLAN security monitoring system must have wireless device detection function,pseudo AP attack monitoring function,wireless DOS attack monitoring function and router vulnerability monitoring function.Then,the storage location of the information collected by the WLAN security monitoring system is discussed.It is concluded that the collected monitoring information needs to be stored separately on a machine to realize the remote storage of information.Finally,the system function module is designed in more detail and the overall architecture of the system is designed.(2)The wireless LAN security monitoring system is realized.The system realizes wireless device detection function,fake AP monitoring function,wireless DOS attack monitoring function,router vulnerability monitoring function and information remote storage function.In the implementation scheme of fake AP monitoring function,combined with previous work experience,this scheme uses MAC address,channel,signal strength,sequence number and time stamp to comprehensively judge whether there is fake AP in the environment,which is more sensitive to judge the effect of fake AP.In the implementation scheme of DOS attack monitoring function,this scheme generates DOS attack prediction model by introducing Gru(gated recurrent unit)neural network,and uses this model to monitor DOS attacks.Compared with the traditional scheme of using threshold to distinguish DOS attacks,this scheme is more novel.In the implementation scheme of router vulnerability monitoring function,this scheme realizes router vulnerability monitoring function by integrating routersploit vulnerability scanning framework,which solves the problem of lack of router security monitoring in traditional wireless security monitoring system.In the realization scheme of information remote storage function,this scheme uses syslog,logstah,Kafka technology to complete the information remote storage function,so as to ensure that the normal operation of the system will not be affected by the lack of storage space after the system stores a lot of information.(3)The WLAN security monitoring system is tested.Build WLAN test environment,simulate different types of attacks,test the system's wireless device detection,fake AP attack monitoring,wireless DOS attack monitoring,router vulnerability monitoring and other security monitoring related functions.The test results show that the wireless device detection,fake AP attack monitoring and wireless DOS attack monitoring in this system have high accuracy,and can correctly identify the router vulnerability information.
Keywords/Search Tags:fake AP attack monitoring, wireless DOS attack monitoring, router vulnerability monitoring, GRU neural network
PDF Full Text Request
Related items