欢迎光临中图网 请 | 注册
> >
802.11无线局域网应用中的安全攻击防护策略的研究

802.11无线局域网应用中的安全攻击防护策略的研究

作者:刘持标著
出版社:武汉大学出版社出版时间:2016-03-01
开本: 24cm 页数: 233
中 图 价:¥37.4(7.2折) 定价  ¥52.0 登录后可看到会员价
加入购物车 收藏
运费6元,满39元免运费
?新疆、西藏除外
本类五星书更多>
微信公众号

802.11无线局域网应用中的安全攻击防护策略的研究 版权信息

802.11无线局域网应用中的安全攻击防护策略的研究 内容简介

本书主要从如何解决信息化应用中的信息泄露问题, 如何避免802.11无线拒绝服务攻击两个方面来对无线安全问题进行深入研究。在研究成果的基础上, 进一步探讨了安全高效802.11无线通信技术在不同领域的应用。

802.11无线局域网应用中的安全攻击防护策略的研究 目录

CHAPTER 1 Introduction
1.1 Motivations
1.2 Crypto attacks on WLANs
1.2.1 Traffic analysis
1.2.2 Eavesdropping
1.2.3 Man-in-the-middle
1.2.4 Session hijack
1.2.5 Masquerading
1.2.6 Unauthorized access
1.2.7 Replay(or Playback)
1.2.8 Tampering
1.2.9 Forgery
1.3 Approaches to resolve crypto attacks
1.3.1 Wired equivalent privacy
1.3.2 802.11i (TKIP, CCMP)
1.3.3 VPN solution against crypto attacks
1.4 Denial of service (DOS)
1.5 Related DoS research work
1.6 Proposed approaches and contributions
1.6.1 Contributions to resolve crypto attacks
1.6.2 Contributions to resolve DoS attacks
1.7 Outline

CHAPTER 2 Experimental Methodologies
2.1 Summary of tools
2.1.1 Pcattep
2.1.2 WireShark
2.1.3 FreeRadius server
2.1.4 HostAP
2.1.5 Voidll attacking tool
2. 1.6 Wireless sniffer
2.1.7 Network simulation
2.2 Performance measurements
2.2. l TCP throughput
2.2.2 Round trip time
2.2.3 TCP time-sequence graph
2.2.4 UDP throughput and packet loss
2.3 Experimental design
2.3.1 Network emulation of AuthRF and AssRF attacks
2.3.2 Network emulation of DeauthF/DisassF attacks
2.4 Queuing model

CHAPTER 3 Protect Wireless LANs using VPN over 802.11i
3.1 Introduction
3.2 Five S problems of enterprise WLANs
3.2.1 Security attacks on wireless communication (SAOWC)
3.2.2 Stealing wireless resources (SWR)
3.2.3 Sniffing internal traffic (SIT)
3.2.4 Sharing internal resources (SIR)
3.2.5 Security backward compatibility (SBC)
3.2.6 Summary of 5S problems
3.3 Security approaches for five S problems
3.3.1 WEP
3.3.2 WEP-802.1X
3.3.3 VPN/WEP-802.X

CHAPTER 4 AuthRF and AssRF DoS Attacks
CHAPTER 5 DeauthF and DisassF Attacks
CHAPTER 6 RAP DoS Attacks with Markov Chain Model
CHAPTER 7 DoS Attacks against Wireless VolP
CHAPTER 8 Layer-3 Forwarding on Wireless LANs
CHAPTER 9 Wireless Device Server Based Sensor Management Systems
CHAPTER 10 Summary of Contributions and Future Works
展开全部
商品评论(0条)
暂无评论……
书友推荐
本类畅销
编辑推荐
返回顶部
中图网
在线客服