当前位置:主页 > 科技论文 > 网络通信论文 >

基于无线设备特征指纹的无线钓鱼接入点检测技术研究

发布时间:2018-12-28 17:48
【摘要】:无线局域网(WLAN:Wireless LAN)作为固网和移动通信网的一种有效的补充手段,是传统运营商和移动运营商业务发展的重点。因此,随着城市无线局域网热点在公共场所大规模的部署,无线局域网安全变得尤为突出和重要。由于无线电通信特殊的辐射性、无线空间传播信道的开放性,导致包括:假冒攻击、网络欺骗、信息窃取等诸多不安全因素,使网络运营和通信信息的安全受到极大威胁,其中无线钓鱼接入点(AP:Access Poi nt)攻击是无线网络中严重的安全威胁之一。攻击者一般会在具有城市公共热点或其他网络热点的区域部署无线钓鱼AP,无线钓鱼AP和合法授权的AP具有相同的无线网络名称(SSID:Service Set Identifier),使得受害者误以为是合法授权的接入点进行连接,从而导致一系列的无线网络攻击发生,如无线中间人攻击和无线钓鱼攻击。因此,本文主要讨论的就是在这些无线网络攻击发生之前,或者用户接入无线网络之前检测出目标无线网络中是否存在无线钓鱼AP。文章中首先介绍了无线钓鱼AP相关原理,包括无线钓鱼AP的构造实现原理和攻击原理。其次,介绍了无线钓鱼AP检测技术的研究现状并对现有检测技术进行分类比较。文章中研究了基于无线设备特征指纹的无线钓鱼AP检测技术,利用无线设备固有的特征指纹来区分真假AP。文章中将无线设备特征指纹分为两类:基于无线端的特征指纹和基于特种MAC帧刺激响应的特征指纹,并通过相关实验提取这些特征指纹。特征指纹提取实验结果表明,这两类无线设备的特征指纹可以检测出目前大部分无线钓鱼AP。最后,文章提出了一种面向用户、轻量级、高效率、低错误率的无线钓鱼AP检测方案。
[Abstract]:Wireless local area network (WLAN:Wireless LAN), as an effective supplementary means of fixed network and mobile communication network, is the focus of the development of traditional operators and mobile operators. Therefore, with the large-scale deployment of urban WLAN hot spots in public places, WLAN security becomes particularly prominent and important. Due to the special radiance of radio communication and the openness of wireless space communication channel, many unsafe factors, such as counterfeit attack, network deception, information theft, etc., threaten the network operation and the security of communication information. Phishing access Point (AP:Access Poi nt) is one of the serious security threats in wireless network. Attackers typically deploy phishing AP, phishing AP and legally authorized AP with the same wireless network name (SSID:Service Set Identifier),) in areas with urban public hot spots or other network hotspots The victim is mistaken for the connection of legally authorized access points, which leads to a series of wireless network attacks, such as wireless man-in-the-middle attacks and phishing attacks. Therefore, the main discussion in this paper is to detect the existence of phishing AP. in the target wireless network before these wireless network attacks occur, or before the user accesses the wireless network This paper first introduces the related principles of the phishing AP, including the construction realization principle and attack principle of the phishing AP. Secondly, this paper introduces the research status of AP detection technology and classifies and compares the existing detection techniques. In this paper, a wireless phishing AP detection technology based on wireless device feature fingerprint is studied, and the inherent feature fingerprint of wireless device is used to distinguish true and false AP.. In this paper, the feature fingerprint of wireless device is divided into two categories: one is based on wireless end and the other is based on special MAC frame stimulus response. The experimental results of feature fingerprint extraction show that the feature fingerprints of these two types of wireless devices can detect most of the current wireless phishing AP.. Finally, this paper presents a lightweight, efficient and low error rate wireless phishing AP detection scheme.
【学位授予单位】:南京邮电大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TN915.08

【相似文献】

相关期刊论文 前1条

1 黄芬;打造“中兴网络”的特征指纹[J];通信世界;2004年28期

相关硕士学位论文 前1条

1 顾杨;基于无线设备特征指纹的无线钓鱼接入点检测技术研究[D];南京邮电大学;2014年



本文编号:2394248

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2394248.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户58264***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com