期刊文献+

高隐蔽性的无线网络主动钓鱼攻击及其防范研究 被引量:8

A Stealthy Wireless Active Phishing Attack and Countermeasure
原文传递
导出
摘要 提出一种新的无线网络钓鱼攻击,该攻击采用主动攻击方式,将受害者切换到钓鱼无线接入点,同时使用低速率无线网络攻击以提高隐蔽性,并讨论了高隐蔽性无线主动钓鱼攻击模型和攻击条件,给出了一种实现此攻击的具体方法以证明其可行性.同时,针对该类型攻击提出了一种基于累加和控制(CUSUM)的检测方法,并验证了其有效性. This paper proposes a novel wireless phishing attack which uses active methods to switch victim to rogue phishing wireless access points. This attack utilizes stealthy row-rate wireless jamming attack to hide itself. This paper discusses the attacking model and the conditions of this stealthy active attack. A detailed method is given to show the feasibility of this attack. To defense against this attack, we propose a cumulative sum(CUSUM)-based de- tection method. The simulation results show that our method can efficiently detect this wireless phishing attack.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2013年第2期171-177,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家重点基础研究发展计划(973)项目(2011CB302903) 国家自然科学基金(61202353 61272084) 江苏高校优势学科建设工程(YX002001)资助项目
关键词 无线网络安全 钓鱼攻击 主动攻击 变化点检测 wireless network security~ phishing attack~ active attack~ change point detection
  • 相关文献

参考文献16

  • 1Song Yimin, Yang Chao, Gu Guofei. Who is peeping at your passwords at starbucks? ---To catch an evil twin access point[C]//Proceedings of the 40th Annu- al IEEE/IFIP International Conference on Dependa ble Systems and Networks (DSN' 10). Chicago, IL.. IEEE Computer Society Press,2010 :323-332.
  • 2Xu F Y,Tan C C,Zhang Y F,et al. Defending against vehicular rogue Aps[C]//Proceedings of IEEE 30th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2011 ). Shang- hai : IEEE Computer Society Press, 2011 : 1665-1673.
  • 3Sheng B,Tan C C,l.i Q,et al. A timing-based scheme for rogue AP detection[J]. IEEE Transactions on Parallel and Distributed Systems ,2011,22( 11 ) : 1912- 1925.
  • 4Bellardo J, Savage S. 802.11 denial-of-service attacks:Real vulnerabilities and practical solutions [C]//Pro- ceedings of the 12th USENIX Security Symposium. Washington DC.. USENIX Association, 2003: 15-28.
  • 5Xu W, Trappe W, Zhang Y,et al. The feasibility of launching and detecting jamming attacks in wireless networks[C]//Proceedings of the 6th ACM Interna- tional Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc05). New York: ACM Press, 2005:46-57.
  • 6Kuzmanovic A, Knightly E W. Low-rate TCP-targe- ted denial of service attacks., the shrew vs. the mice and elephants[C]//Proceedings of the 2003 Confer- ence on Applications, Technologies, Architectures, and Protocols for Computer Communications ( SIG- COMM 2003). New York: ACM Press,2003 :75-86.
  • 7Luo X, Chang R K C. On a new class of pulsing denial of service attacks and the defense[C]//Proceedings of Network and Distributed System Security Symposium 2005 (NDSS2005). San Diego :Internet Socie'ty, 2005: 61-79.
  • 8吴志军,张东.低速率DDoS攻击的仿真和特征提取[J].通信学报,2008,29(1):71-76. 被引量:12
  • 9Guirguis M, Bestavros A, Matta I,etal. Reduction of quality (RoQ) attacks on Internet end-systems[C]// Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2005 ). Miami: IEEE Computer Society Press, 2005 : 1362-1372.
  • 10Guirguis M, Bestavros A, Matta I. On the impact of low-rate attacks[C]//Proceedings of the 41st IEEE International Conference on Communications (ICC'06). Istanbul.. IEEE Computer Society Press, 2006: 2316-2321.

二级参考文献17

  • 1何慧,张宏莉,张伟哲,方滨兴,胡铭曾,陈雷.一种基于相似度的DDoS攻击检测方法[J].通信学报,2004,25(7):176-184. 被引量:36
  • 2孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 3任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报,2006,27(5):6-11. 被引量:56
  • 4孙红杰,方滨兴,张宏莉.基于链路特征的DDoS攻击检测方法[J].通信学报,2007,28(2):88-93. 被引量:11
  • 5SPECHT S M, LEE R B. Distributed denial of service: taxonomies of attacks, tools, and countermeasures[A]. Proceedings of the 17th Int'l Conf[C]. 2004.536-543.
  • 6LUO X, CHANG R K C. On a new class of pulsing denial-of-service attacks and the defense[A]. Network and Distributed System Security Symposium (NDSS'05)[C]. San Diego, CA, 2005.2-5.
  • 7PAN R, PRABHAKAR B, PSOUNIS K. CHOKe: a stateless active queue management scheme for approximating fair bandwidth allocation[A]. INFOCOM 2000[C]. 2000. 942-951.
  • 8KUZMANOVIC A, KNIGHTLY E W. Low-rate TCP-targeted denial of service attacks-the shrew vs the mice and elephants[A]. Proceedings ofACM SIGCOMM 2003[C]. 2003.
  • 9SUN H B, LUI J C S, YAU D K Y. Defending against low-tale TCP attacks: dynamic detection and protection[A]. Proc IEEE International Conference on Network Protocols ([CNP)[C]. Berlin, Germany, 2004. 5-8.
  • 10STEVENS W R. TCP/IP Illustrated Volume 1:The Protocols[M]. Addison-Wesley, Hardcover, Published, 1994.

共引文献11

同被引文献89

引证文献8

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部