期刊文献+

无线钓鱼接入点攻击与检测技术研究综述 被引量:23

Wireless Rogue Access Point Attack and Detection Research
原文传递
导出
摘要 随着城市无线局域网热点在公共场所大规模的部署,无线局域网安全变得尤为突出和重要,其中无线钓鱼接入点(AP:Access Point)攻击是无线网络中严重的安全威胁之一.本文介绍了无线钓鱼AP攻击存在的威胁,详细分析了无线钓鱼AP攻击的基本原理和实现,阐述了无线钓鱼AP攻击主要目的和构造实现方法.基于无线钓鱼AP攻击的基本原理将无线钓鱼攻击实现方式分为被动式攻击和主动式攻击,并分别从物理层和MAC层详细分析了主动式攻击.对现有无线钓鱼AP检测技术:无线端、有线端和混合式三类嗅探检测技术,重点分析了基于802.11特征指纹的检测技术.对未来工作进行了展望,介绍了下一代无线钓鱼AP检测技术的特征. With the wide deployment of the urban wireless LAN hotspots in public places, the WLAN security has become particularly prominent and significant, and wireless rogue AP(Access Point) attack is one of the most serious security issues. This paper begins with a brief introduction of the threat of wireless rogue AP attacks. Then we make detailed analysis of the basic principles and the implementation of wireless rogue AP attacks. We discuss the main three objectives and two different configurations for wireless rogue AP attacks. According to the technologies used by wireless rogue AP attacks, the attacks can be divided into passive attacks and active attacks. Active attacks are ana- lyzed from the physical layer and MAC layer. The paper presents and analyzes the existing wireless rogue AP detec- tion methods, which can be divided into., the wireless detection, the wired detection and hybrid detection. We focus on the detection using 802.11 fingerprint. Finally, we look into the future of rogue AP detection and propose features of the next generation of wireless phishing AP detection method.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2014年第1期13-23,共11页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金(61202353 61272084) 江苏省高校自然科学基金(12KJB520008)资助项目
关键词 无线局域网安全 无线钓鱼接入点 钓鱼AP检测 802 11特征指纹 wireless LAN security wireless rogue access point rogue AP detection 802.11 fingerprint
  • 相关文献

参考文献30

  • 1LAN/MAN Committee of the IEEE Computer Society. IEEE Standard for Information Technology-Telecommunication and information exchange between system-LANs and MANs-Specific requirements-Part1 1:WLAN MAC and PHY Specifications(ANSI/ IEEE Std 802.11,2007)[OL].http://ieeexplore.ieee.org/stamp/stamp.jsp? tp =&arnumber =4248378,2013.
  • 2Nikbakhsh S,Manaf A B A,Zamani M. A Novel Approach for Rogue Access Point Detection on the Client-Side[A].Washington,DC:IEEE Computer Society,2012.684-687.
  • 3陈伟,顾杨,于乐.高隐蔽性的无线网络主动钓鱼攻击及其防范研究[J].武汉大学学报(理学版),2013,59(2):171-177. 被引量:8
  • 4郭渊博;杨奎武;张畅.无线局域网安全:设计及实现[M]北京:国防工业出版社,2010.
  • 5Harjula I,Pinola J,Prokkola J. Performance of IEEE 802.11 Based WLAN Devices Under Various Jamming Singnals[DB/OL].http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber-6127635,2013.
  • 6Xu W Y,Wade T,Zhang Y Y. The Feasibilityof Launching and Detecting Jamming Attacks in Wireless Networks[A].New York:ACM,2005.46-57.
  • 7Noubir G,Rajaraman R. On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming[DB/OL].http://www.cs.odu.edu/~ nadeem/classes/cs795-WNS-S 13/papers/sec-001.pdf,2013.
  • 8陈伟,俞雷,张迎周.802.11协议中RTS/CTS机制的安全漏洞分析[J].计算机应用,2008,28(12):3183-3186. 被引量:4
  • 9杨哲.无线网络安全攻防实战进阶[M]北京:电子工业出版社,2011.
  • 10Bellardo J,Savage S. 802.11 Denial-of-Service Attacks:Real Vulnerabilities and Practical Solutions[DB/OL].http://static.usenix.org/event/sec03/tech/ full _ papers/bellardo/bellardo _ html/,2013.

二级参考文献30

  • 1冯柳平,刘祥南.基于IEEE802.11认证协议的DoS攻击[J].计算机应用,2005,25(3):546-547. 被引量:8
  • 2夏新军,俞能海,刘洋.WLAN环境下拒绝服务攻击问题研究[J].计算机工程与应用,2005,41(25):129-132. 被引量:12
  • 3刘军,郭伟,黄飞,肖百龙.无线局域网中一种自适应RTS门限调整算法[J].计算机学报,2007,30(4):547-554. 被引量:11
  • 4BELLARDO J. SAVAGE S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions[ C]// Proceedings of the 12th USENIX Security Syinposium. Berkeley, USA: USENIX Association, 2003:15-28.
  • 5RAYA M, HUBAUX J P, AAD I. DOMINO: a System to Detect Greedy Behavior in IEEE 802.11 hotspots[ C]//Proceedings of the 2nd international conference on Mobile systems, applications, and services. New York: ACM, 2004: 84-97.
  • 6GUPTA V, KRISttNAMURTHY S, FALOUTSOS M. Denial of Serv- ice Attacks at the MAC Layer in Wireless Ad Hoc Networks [ EB/ OL]. [2008 - 08 - 12]. http://203. 208.39.99/search? q = cache: M2hXrhSe0FgJ: www. cs. ucr. edu/- krish/milcom_vik, pdf.
  • 7CHEN DAZHI, DENG JING, VARSHNEY P K. Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming[ EB/OL]. [ 2008 -08 - 12]. http://203. 208.39. 99/ search? q = caehe: FIGv7qtUjvkJ: www. sigmobile, org/mobicom/ 2003/posters/11-Chen. pdf.
  • 8RAY S, CARRUTHERS J B, STAROBINSKI D. RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs[ EB/OL]. [2008 -08 - 12]. http://203. 208.39.99/search? q = cache: 39jRxwbYJ3kJ: people, bu. edu/staro/wcnc - ray. pdf.
  • 9RONG YANXIA, LEE Sang-Kyu, CHOI Hyeong-Ah. Detecting Stations Cheating on Backoff Rules in 803. 11 Networks Using Sequential Analysis[ EB/OL]. [ 2008 - 08 - 12]. http://www, seas. gwu. edu/- hchoi/publication/wireless/infocom06, pdf.
  • 10XU WENYUAN, TRAPPE W, ZHANG YANYONG, et al. The Feasibility of Launching and Detecting Jamming Attacks In Wireless Networks[ EB/OL]. [ 2008 -08 - 12]. http://www, winlab, rutgets. edu/-trappe/Papers/JamDetect_Mobihoc, pdf.

共引文献10

同被引文献88

  • 1余荣.浅谈无线局域网的安全性[J].铁路通信信号工程技术,2004(3):34-37. 被引量:3
  • 2杨新,付毓生,甘荣华,杨晓波.IEEE802.11无线局域网安全漏洞研究[J].信息安全与通信保密,2005,27(7):296-299. 被引量:3
  • 3徐静,常朝稳.SSL协议的安全性分析[J].微计算机信息,2006,22(03X):19-21. 被引量:9
  • 4王垚,胡铭曾,李斌,闫伯儒.域名系统安全研究综述[J].通信学报,2007,28(9):91-103. 被引量:27
  • 5CHENG Ningning, WANG Xinlei, CHENG Wei, et al.Characterizing Privacy Leakage of Public Wi-Fi Networks for Users onTravel[C]// IEEE.INFOCOM, 2013 Proceedings IEEE, April 14-19,2013.Turin,Italy. NJ:IEEE,2013:2769-2777.
  • 6HASTINGSN E,MCLEAN P A.TCP/IP SpoofingFundamentals[C]// IEEE.Computers and Communications,1996.,Conference Proceedings of the 1996 IEEE Fifteenth AnnualInternational Phoenix Conference on, March 27-29, 1996. Scottsdale,AZ, USA. NJiIEEE, 1996:218-224.
  • 7WANGShaoqiang, XU Dongsheng, YAN Shiliang. Analysis andApplication of Wireshark in TCP/IP Protocol Teaching[C]// IEEE.E-health Networking, Digital Ecosystems and Technologies (EDT),2010International Conference on, April 17 - 18,2010. Shenzhen,China.NJiIEEE, 2010(2):269-272.
  • 8经信局.《信息安全技术公共及商用服务信息系统个人信息保护指南》已编制完成[EB/OL]. http://www.hengshan.gov.cn/main/zfxxgk/xxgkml/gzdt/zwdt/c7bb9a5c-9fd5-4c9f-al34-f2617651bb72.shtml,2012-07-18.
  • 9Song Y M,Yang C,Gu G F.Who Is Peeping at Your Passwords at Starbucks--To Catch an Evil Twin Access Point[C]//Dependable Systems and Networks,IEEE/IFIP International Conference on.IEEE,2010:323-332.
  • 10Han H,Xu F Y,Tan C C,et al.Defending against vehicular rogue APs[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:1665-1673.

引证文献23

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部