期刊文献+

无线网络钓鱼AP攻击检测技术研究 被引量:5

RESEARCH ON DETECTION TECHNOLOGY OF FISHING AP ATTACK IN WIRELESS NETWORK
下载PDF
导出
摘要 随着无线局域网应用的普及,针对无线网络的攻击方式也逐渐增多。无线钓鱼AP攻击通过被动或主动方式诱使用户连接钓鱼AP,进而获取用户的敏感信息,是当前被滥用的攻击方式之一。针对这种情况,提出一种改进的钓鱼AP攻击检测方法,通过利用TTL值的递减变化,以及综合分析网关与路由信息,实现对AP的合法性检测。实验结果表明,该方法能够有效地检测无线钓鱼AP和无线中间人等攻击。 With the popularisation of WLAN,the attacks against wireless network are increasingly growing. Wireless fishing AP attack,through passive or active way,induces users to connect fishing AP,and then catches users' sensitive information,it is currently one of the abused attack modes. In light of this,we proposed an improved fishing AP attack detection method,by using diminishing variation of TTL value as well as comprehensively analysing the gateway and routing information,it realises validity detection on AP. Experimental results showed that this method can effectively detect the attacks including wireless fishing AP and wireless man-in-the-middle.
作者 金双齐 凌捷
出处 《计算机应用与软件》 CSCD 2016年第10期307-310,共4页 Computer Applications and Software
基金 广东省自然科学基金项目(S2012020011071) 广东省科技计划项目(2013B040401017 2014A010103029) 广州市科技计划项目(2014J4100201)
关键词 钓鱼AP攻击 WLAN WIFI Fishing AP attack WLAN WiFi
  • 相关文献

参考文献10

  • 1齐惠英.基于EAP-TLS的WLAN安全认证[J].科技通报,2012,28(10):25-27. 被引量:1
  • 2Song Y M,Yang C,Gu G F.Who Is Peeping at Your Passwords at Starbucks--To Catch an Evil Twin Access Point[C]//Dependable Systems and Networks,IEEE/IFIP International Conference on.IEEE,2010:323-332.
  • 3Han H,Xu F Y,Tan C C,et al.Defending against vehicular rogue APs[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:1665-1673.
  • 4Han H,Sheng B,Tan C C,et al.A Timing-Based Scheme for Rogue APDetection[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(11):1912-1925.
  • 5Han H,Xu F Y,Tan C C,et al.Defending against vehicular rogue APs[C]//INFOCOM,2011 Proceedings IEEE.IEEE,2011:1665-1673.
  • 6陈伟,顾杨,于乐.高隐蔽性的无线网络主动钓鱼攻击及其防范研究[J].武汉大学学报(理学版),2013,59(2):171-177. 被引量:8
  • 7陈伟,顾杨,李晨阳,吴震雄.无线钓鱼接入点攻击与检测技术研究综述[J].武汉大学学报(理学版),2014,60(1):13-23. 被引量:23
  • 8Bratus S,Cornelius C,Kotz D,et al.Active behavioral fingerprinting of wireless devices[C]//Proceedings of the First ACM Conference on Wireless Network Security,2008:56-61.
  • 9蒋华,阮玲玲,王鑫.基于SHA-256消息认证的四次握手协议研究[J].微电子学与计算机,2014,31(8):155-158. 被引量:2
  • 10Kim I,Seo J,Shon T,et al.A novel approach to detection of mobile rogue access points[J].Security and Communication Networks,2014,7(10):1510-1516.

二级参考文献53

  • 1王红霞,陆塞群.基于HMAC-SHA1算法的消息认证机制[J].山西师范大学学报(自然科学版),2005,19(1):30-33. 被引量:9
  • 2吕明程,吕晶.基于802.1x的WLAN安全性解决方案研究[J].辽宁大学学报(自然科学版),2005,32(4):371-372. 被引量:2
  • 3Song Yimin, Yang Chao, Gu Guofei. Who is peeping at your passwords at starbucks? ---To catch an evil twin access point[C]//Proceedings of the 40th Annu- al IEEE/IFIP International Conference on Dependa ble Systems and Networks (DSN' 10). Chicago, IL.. IEEE Computer Society Press,2010 :323-332.
  • 4Xu F Y,Tan C C,Zhang Y F,et al. Defending against vehicular rogue Aps[C]//Proceedings of IEEE 30th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2011 ). Shang- hai : IEEE Computer Society Press, 2011 : 1665-1673.
  • 5Sheng B,Tan C C,l.i Q,et al. A timing-based scheme for rogue AP detection[J]. IEEE Transactions on Parallel and Distributed Systems ,2011,22( 11 ) : 1912- 1925.
  • 6Bellardo J, Savage S. 802.11 denial-of-service attacks:Real vulnerabilities and practical solutions [C]//Pro- ceedings of the 12th USENIX Security Symposium. Washington DC.. USENIX Association, 2003: 15-28.
  • 7Xu W, Trappe W, Zhang Y,et al. The feasibility of launching and detecting jamming attacks in wireless networks[C]//Proceedings of the 6th ACM Interna- tional Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc05). New York: ACM Press, 2005:46-57.
  • 8Kuzmanovic A, Knightly E W. Low-rate TCP-targe- ted denial of service attacks., the shrew vs. the mice and elephants[C]//Proceedings of the 2003 Confer- ence on Applications, Technologies, Architectures, and Protocols for Computer Communications ( SIG- COMM 2003). New York: ACM Press,2003 :75-86.
  • 9Luo X, Chang R K C. On a new class of pulsing denial of service attacks and the defense[C]//Proceedings of Network and Distributed System Security Symposium 2005 (NDSS2005). San Diego :Internet Socie'ty, 2005: 61-79.
  • 10Guirguis M, Bestavros A, Matta I,etal. Reduction of quality (RoQ) attacks on Internet end-systems[C]// Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2005 ). Miami: IEEE Computer Society Press, 2005 : 1362-1372.

共引文献30

同被引文献10

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部