期刊文献+

无线网络中WEP攻击数据集的分析与实现 被引量:3

Construction Method and Realization of Datasets under Wireless Network WEP Attack
下载PDF
导出
摘要 针对有线对等私密协议(wired equivalent privacy,WEP)下的无线安全漏洞与KDD99攻击数据集中攻击特征的构成,利用人为构造的无线环境下WEP协议攻击实验,基于特征选择算法,完整地实现了WEP攻击数据的采集与特征提取,并进一步构建了基于WEP协议的攻击数据集. The authors deeply researched into wireless security vulnerability of WEP (wired equivalent privacy)protocol and the generation of attack characteristics in the KDD9 9 attack dataset.Using the artificial WEP protocol attack experiment in the wireless environment and the feature selection algorithm,we fully achieved the collection of the WEP attack data and its features extraction,and furthermore built an attack dataset under the WEP protocol.This method for dataset construction of multiple attack types in wireless network has a certain degree of significance.
出处 《吉林大学学报(理学版)》 CAS CSCD 北大核心 2014年第1期71-75,共5页 Journal of Jilin University:Science Edition
基金 国家自然科学基金(批准号:61073009 61163052) 国家重点基础研究发展计划973项目基金(批准号:2009CB320706) 国家高技术研究发展计划863项目基金(批准号:2011AA010101) 新疆大学博士科研启动基金(批准号:BS110126)
关键词 无线网络 WEP协议 WEP攻击 特征数据集 wireless networks WEP protocol WEP attack data acquisition
  • 相关文献

参考文献12

二级参考文献80

  • 1易平,蒋嶷川,张世永,钟亦平.移动ad hoc网络安全综述[J].电子学报,2005,33(5):893-899. 被引量:63
  • 2YI Ping,HOU Yafei,ZHONG Yiping,ZHANG Shiyong.An Immunity-based Security Architecture for Mobile Ad Hoc Networks[J].通讯和计算机(中英文版),2005,2(1):34-40. 被引量:1
  • 3王茂才,戴光明,宋军,胡汉平.无线局域网的安全性研究[J].计算机应用研究,2007,24(1):158-160. 被引量:44
  • 4LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) Specifications[S]. 1999.
  • 5Bittau A, Handley M, Joshua L. The Final Nail in WEP's Coffin[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Computer Society, 2006: 386-400.
  • 6Tews E, Ralf-Philipp W, Pyshkin A. Breaking 104 Bit WEP in Less than 60 Seconds[EB/OL]. (2007-12-13). http://eprint.iacr.org/.
  • 7Tews E. Attacks on the WEP Protocol[EB/OL]. (2007-10-13).www.cdc.in formatik.tu-darmstadt.de/reports/reports/Erik_Tews.dipl om. pdf.
  • 8Problem with HTTP[Z]. (2007-11-22). http://www.aircrack-ng.org.
  • 9Kore K. Chopcho'p(Experimental WEP Attacks)[EB/OL]. (2004-08- 23). http://www.netstumbler.org/showthread.php?t= 12489.
  • 10Arbaugh W A. An Inductive Chosen Plaintext Attack Against Wep/Wep2[EB/OL]. (2001-10-24). http://www.cs.umd.edu/-waa/ attaek/frame.Htm.

共引文献54

同被引文献24

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部