扫一扫
关注中图网
官方微博
本类五星书更多>
-
>
决战行测5000题(言语理解与表达)
-
>
软件性能测试.分析与调优实践之路
-
>
第一行代码Android
-
>
深度学习
-
>
Unreal Engine 4蓝图完全学习教程
-
>
深入理解计算机系统-原书第3版
-
>
Word/Excel PPT 2013办公应用从入门到精通-(附赠1DVD.含语音视频教学+办公模板+PDF电子书)
802.11无线局域网应用中的安全攻击防护策略的研究 版权信息
- ISBN:9787307173842
- 条形码:9787307173842 ; 978-7-307-17384-2
- 装帧:暂无
- 册数:暂无
- 重量:暂无
- 所属分类:>
802.11无线局域网应用中的安全攻击防护策略的研究 内容简介
本书主要从如何解决信息化应用中的信息泄露问题, 如何避免802.11无线拒绝服务攻击两个方面来对无线安全问题进行深入研究。在研究成果的基础上, 进一步探讨了安全高效802.11无线通信技术在不同领域的应用。
802.11无线局域网应用中的安全攻击防护策略的研究 目录
CHAPTER 1 Introduction
1.1 Motivations
1.2 Crypto attacks on WLANs
1.2.1 Traffic analysis
1.2.2 Eavesdropping
1.2.3 Man-in-the-middle
1.2.4 Session hijack
1.2.5 Masquerading
1.2.6 Unauthorized access
1.2.7 Replay(or Playback)
1.2.8 Tampering
1.2.9 Forgery
1.3 Approaches to resolve crypto attacks
1.3.1 Wired equivalent privacy
1.3.2 802.11i (TKIP, CCMP)
1.3.3 VPN solution against crypto attacks
1.4 Denial of service (DOS)
1.5 Related DoS research work
1.6 Proposed approaches and contributions
1.6.1 Contributions to resolve crypto attacks
1.6.2 Contributions to resolve DoS attacks
1.7 Outline
CHAPTER 2 Experimental Methodologies
2.1 Summary of tools
2.1.1 Pcattep
2.1.2 WireShark
2.1.3 FreeRadius server
2.1.4 HostAP
2.1.5 Voidll attacking tool
2. 1.6 Wireless sniffer
2.1.7 Network simulation
2.2 Performance measurements
2.2. l TCP throughput
2.2.2 Round trip time
2.2.3 TCP time-sequence graph
2.2.4 UDP throughput and packet loss
2.3 Experimental design
2.3.1 Network emulation of AuthRF and AssRF attacks
2.3.2 Network emulation of DeauthF/DisassF attacks
2.4 Queuing model
CHAPTER 3 Protect Wireless LANs using VPN over 802.11i
3.1 Introduction
3.2 Five S problems of enterprise WLANs
3.2.1 Security attacks on wireless communication (SAOWC)
3.2.2 Stealing wireless resources (SWR)
3.2.3 Sniffing internal traffic (SIT)
3.2.4 Sharing internal resources (SIR)
3.2.5 Security backward compatibility (SBC)
3.2.6 Summary of 5S problems
3.3 Security approaches for five S problems
3.3.1 WEP
3.3.2 WEP-802.1X
3.3.3 VPN/WEP-802.X
CHAPTER 4 AuthRF and AssRF DoS Attacks
CHAPTER 5 DeauthF and DisassF Attacks
CHAPTER 6 RAP DoS Attacks with Markov Chain Model
CHAPTER 7 DoS Attacks against Wireless VolP
CHAPTER 8 Layer-3 Forwarding on Wireless LANs
CHAPTER 9 Wireless Device Server Based Sensor Management Systems
CHAPTER 10 Summary of Contributions and Future Works
1.1 Motivations
1.2 Crypto attacks on WLANs
1.2.1 Traffic analysis
1.2.2 Eavesdropping
1.2.3 Man-in-the-middle
1.2.4 Session hijack
1.2.5 Masquerading
1.2.6 Unauthorized access
1.2.7 Replay(or Playback)
1.2.8 Tampering
1.2.9 Forgery
1.3 Approaches to resolve crypto attacks
1.3.1 Wired equivalent privacy
1.3.2 802.11i (TKIP, CCMP)
1.3.3 VPN solution against crypto attacks
1.4 Denial of service (DOS)
1.5 Related DoS research work
1.6 Proposed approaches and contributions
1.6.1 Contributions to resolve crypto attacks
1.6.2 Contributions to resolve DoS attacks
1.7 Outline
CHAPTER 2 Experimental Methodologies
2.1 Summary of tools
2.1.1 Pcattep
2.1.2 WireShark
2.1.3 FreeRadius server
2.1.4 HostAP
2.1.5 Voidll attacking tool
2. 1.6 Wireless sniffer
2.1.7 Network simulation
2.2 Performance measurements
2.2. l TCP throughput
2.2.2 Round trip time
2.2.3 TCP time-sequence graph
2.2.4 UDP throughput and packet loss
2.3 Experimental design
2.3.1 Network emulation of AuthRF and AssRF attacks
2.3.2 Network emulation of DeauthF/DisassF attacks
2.4 Queuing model
CHAPTER 3 Protect Wireless LANs using VPN over 802.11i
3.1 Introduction
3.2 Five S problems of enterprise WLANs
3.2.1 Security attacks on wireless communication (SAOWC)
3.2.2 Stealing wireless resources (SWR)
3.2.3 Sniffing internal traffic (SIT)
3.2.4 Sharing internal resources (SIR)
3.2.5 Security backward compatibility (SBC)
3.2.6 Summary of 5S problems
3.3 Security approaches for five S problems
3.3.1 WEP
3.3.2 WEP-802.1X
3.3.3 VPN/WEP-802.X
CHAPTER 4 AuthRF and AssRF DoS Attacks
CHAPTER 5 DeauthF and DisassF Attacks
CHAPTER 6 RAP DoS Attacks with Markov Chain Model
CHAPTER 7 DoS Attacks against Wireless VolP
CHAPTER 8 Layer-3 Forwarding on Wireless LANs
CHAPTER 9 Wireless Device Server Based Sensor Management Systems
CHAPTER 10 Summary of Contributions and Future Works
展开全部
书友推荐
- >
回忆爱玛侬
回忆爱玛侬
¥11.5¥32.8 - >
诗经-先民的歌唱
诗经-先民的歌唱
¥15.5¥39.8 - >
自卑与超越
自卑与超越
¥17.9¥39.8 - >
二体千字文
二体千字文
¥14.0¥40.0 - >
名家带你读鲁迅:朝花夕拾
名家带你读鲁迅:朝花夕拾
¥13.9¥21.0 - >
罗曼·罗兰读书随笔-精装
罗曼·罗兰读书随笔-精装
¥18.6¥58.0 - >
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
新文学天穹两巨星--鲁迅与胡适/红烛学术丛书(红烛学术丛书)
¥9.9¥23.0 - >
经典常谈
经典常谈
¥19.9¥39.8
本类畅销
-
基于近邻思想和同步模型的聚类算法
¥44.1¥59 -
深度学习
¥92.4¥168 -
微信背后的产品观
¥62.6¥88 -
NGINX经典教程
¥89.9¥119.8 -
图解TCP/IP(第6版)
¥56.9¥79.8 -
物联网动态服务的协同感知与调控优化
¥51.4¥72