期刊文献+

基于移动端虚假无线AP的钓鱼攻击及预防的软件研发

Based on the mobile end false wireless AP phishing attacks and prevention of software development
下载PDF
导出
摘要 文章介绍了一种利用虚假无线AP的钓鱼攻击方法,攻击者可容易地架设伪接入点,诱骗用户连接进而窃取用户信息或对连接用户发动主动攻击。为了预防移动端也受到此类虚假无线AP钓鱼攻击,文章开发了一款用在移动端检测连接Wi Fi是否安全的软件,对连接的Wi Fi进行检测,可有效防止钓鱼攻击,保护个人信息安全。 This paper mainly introduces a kind of false wireless AP phishing attack, the attacker set up fake access point, tricking users to connect to steal the user information or to connect the user's active attacks. In order to prevent the mobile terminal has also been such false wireless AP phishing attacks, this paper developed a connection in the mobile terminal testing whether the wifi security software, to test the connection of wifi, effectively prevent phishing attacks, the protection of personal information.
机构地区 北方民族大学
出处 《信息通信》 2016年第4期91-92,共2页 Information & Communications
基金 北方民族大学校级创新项目 (项目编号:YCX1569)
关键词 虚假无线AP 钓鱼攻击 安全检测软件 false wireless AP phishing attacks security detection software
  • 相关文献

参考文献5

二级参考文献16

  • 1Song Yimin, Yang Chao, Gu Guofei. Who is peeping at your passwords at starbucks? ---To catch an evil twin access point[C]//Proceedings of the 40th Annu- al IEEE/IFIP International Conference on Dependa ble Systems and Networks (DSN' 10). Chicago, IL.. IEEE Computer Society Press,2010 :323-332.
  • 2Xu F Y,Tan C C,Zhang Y F,et al. Defending against vehicular rogue Aps[C]//Proceedings of IEEE 30th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2011 ). Shang- hai : IEEE Computer Society Press, 2011 : 1665-1673.
  • 3Sheng B,Tan C C,l.i Q,et al. A timing-based scheme for rogue AP detection[J]. IEEE Transactions on Parallel and Distributed Systems ,2011,22( 11 ) : 1912- 1925.
  • 4Bellardo J, Savage S. 802.11 denial-of-service attacks:Real vulnerabilities and practical solutions [C]//Pro- ceedings of the 12th USENIX Security Symposium. Washington DC.. USENIX Association, 2003: 15-28.
  • 5Xu W, Trappe W, Zhang Y,et al. The feasibility of launching and detecting jamming attacks in wireless networks[C]//Proceedings of the 6th ACM Interna- tional Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc05). New York: ACM Press, 2005:46-57.
  • 6Kuzmanovic A, Knightly E W. Low-rate TCP-targe- ted denial of service attacks., the shrew vs. the mice and elephants[C]//Proceedings of the 2003 Confer- ence on Applications, Technologies, Architectures, and Protocols for Computer Communications ( SIG- COMM 2003). New York: ACM Press,2003 :75-86.
  • 7Luo X, Chang R K C. On a new class of pulsing denial of service attacks and the defense[C]//Proceedings of Network and Distributed System Security Symposium 2005 (NDSS2005). San Diego :Internet Socie'ty, 2005: 61-79.
  • 8Guirguis M, Bestavros A, Matta I,etal. Reduction of quality (RoQ) attacks on Internet end-systems[C]// Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM 2005 ). Miami: IEEE Computer Society Press, 2005 : 1362-1372.
  • 9Guirguis M, Bestavros A, Matta I. On the impact of low-rate attacks[C]//Proceedings of the 41st IEEE International Conference on Communications (ICC'06). Istanbul.. IEEE Computer Society Press, 2006: 2316-2321.
  • 10Ma L, Teymorian A, Cheng X. A hybrid rogue access point protection framework for commodity Wi-Fi net- works[C]//Proceedings of IEEE 27th Annual Joint Conference of the IEEE Computer and Communica- tions Societies ( INFOCOM 2008 ). Phonix: IEEE Computer Society Press,2008 : 1220-1228.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部