无线接入点钓鱼攻击与检测设计
发布时间:2018-08-13 19:18
【摘要】:无线局域网(WLAN:Wireless Local Area Networks)是一种有效的移动互联网连接方式,在平常的生活中随处可见。WLAN的实现协议有很多,其中应用最广泛的是Wi-Fi,因为它能够消除各终端的差异性,能快速便捷的使各终端连接无线网络。随着智能移动设备的兴起,人们对Wi-Fi的依赖逐渐加深,Wi-Fi已经是移动互联网不可或缺的一部分。通过便携式的终端设备,人们可以使用无线Wi-Fi方便快速的接入互联网的社交、浏览网页、网上购物甚至是游戏娱乐等活动。然而随着无线局域网在生活中的普及,面临的安全问题也十分凸显。针对无线局域网的攻击手段层出不穷,其中无线接入点(AP)的钓鱼攻击是无线网络中严重的安全威胁之一。无线接入点钓鱼攻击是指黑客利用无线设备,模拟出一个类似或者完全一样的伪AP,将其配置与真实AP相同各项性能指标以及属性,使得接入者无法判断真假,从而误连上假的AP后导致遭受窃取密码等攻击。无线钓鱼AP被称为不合法的接入点,并非是因为它不由政府机构或者运营商部署,而是因为布置此装置的目的是为了窃取机密,造成破坏。无线钓鱼攻击具有隐蔽性,因为对发动攻击所需要的设备和环境要求不高,攻击成功的整个过程也很短。攻击者可以轻易的发动无线DOS攻击阻断正常连接或者采用“中间人”攻击窃取机密,利用Wi-Fi自动重连的机制对用户进行钓鱼。智能终端在多数存在无线热点的场景下都会选择连接无线热点来提高连接网络的速度,但对该无线热点的安全性及可靠性却无法有效地判断和识别,一旦接入恶意钓鱼的无线热点可能会导致终端内的数据泄露或者重要的信息泄密,给用户的信息安全带来极大的威胁。针对虚假热点和钓鱼热点窃取用户信息的问题,目前国内主要的移动终端检测方式大多停留在检测热点的名称和热点的加密属性这一阶段,称为特征指纹检测。这种检测方法实用性较低,容易被攻击者破解。为了确保无线接入的安全,除了需要根据无线热点的特征属性对无线安全环境做参考外还需要进行更加主动有效的方法。本文设计一种可适用于移动终端设备的基于主动探测的无线钓鱼检测技术,根据无线AP的SSID、MAC地址、IP地址、加密方式四个特征指纹来检测,然后再针对私人Wi-Fi与运营商公共Wi-Fi的不同特性设计不同的主动探测方案,可以使钓鱼攻击的检测更加准确,使人们更加放心的享受无线网络带来的方便。综上所述,从事无线安全检测技术在终端实现的研究应该具有广阔的应用前景和很大的实践研究价值。
[Abstract]:Wireless local area network (WLAN:Wireless Local Area Networks) is an effective way to connect to the mobile Internet. It can be seen everywhere in daily life. Among them, the most widely used protocol is Wi-Fi, because it can eliminate the differences between terminals. Can make each terminal connect wireless network quickly and conveniently. With the rise of smart mobile devices, people's dependence on Wi-Fi has deepened and Wi-Fi has become an integral part of the mobile Internet. Through portable terminal devices, people can use wireless Wi-Fi to quickly access the Internet social, browse the web, shopping online and even games and entertainment activities. However, with the popularity of WLAN in life, the security problems are also highlighted. There are many attacks against WLAN, and the phishing attack of wireless access point (AP) is one of the serious security threats in wireless network. Wireless access point phishing attack refers to hackers using wireless devices to simulate a similar or identical pseudo-APs and configure them with the same performance indexes and attributes as the real AP, which makes the accessor unable to judge the truth and falsehood. Thus the false AP caused by the theft of passwords and other attacks. Phishing AP is called an illegal access point, not because it is not deployed by government agencies or operators, but because it is designed to steal secrets and cause damage. The phishing attack is hidden because the equipment and environment required to launch the attack are not high and the whole process of successful attack is very short. An attacker can easily launch a wireless DOS attack to block the normal connection or use a "middleman" attack to steal secrets and make use of the Wi-Fi automatic reconnection mechanism to fish the user. Intelligent terminals will choose to connect wireless hotspots in most scenarios where there are wireless hotspots, but the security and reliability of the wireless hotspots can not be judged and recognized effectively. Once the wireless hotspot of malicious phishing is accessed, it may lead to data leakage or important information disclosure in the terminal, which will bring great threat to the information security of users. Aiming at the problem of false hot spot and phishing hot spot stealing user information, most of the main mobile terminal detection methods stay at the stage of the name of hot spot and the encryption attribute of hot spot, which is called feature fingerprint detection. This detection method is less practical and is easy to be cracked by attackers. In order to ensure the security of wireless access, it is necessary to make reference to wireless security environment according to the characteristic attributes of wireless hot spots. In this paper, an active detection technique based on active detection for mobile terminal devices is designed. It can be detected by four characteristic fingerprints according to IP address of SSIDN MAC address and encryption method of wireless AP. Then, according to the different characteristics of private Wi-Fi and operator public Wi-Fi, different active detection schemes can be designed, which can make the detection of phishing attacks more accurate, and make people more comfortable to enjoy the convenience brought by wireless network. To sum up, the research of wireless security detection technology in the terminal should have a broad application prospect and great practical research value.
【学位授予单位】:西安工业大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TN915.08;TN925.93
,
本文编号:2181934
[Abstract]:Wireless local area network (WLAN:Wireless Local Area Networks) is an effective way to connect to the mobile Internet. It can be seen everywhere in daily life. Among them, the most widely used protocol is Wi-Fi, because it can eliminate the differences between terminals. Can make each terminal connect wireless network quickly and conveniently. With the rise of smart mobile devices, people's dependence on Wi-Fi has deepened and Wi-Fi has become an integral part of the mobile Internet. Through portable terminal devices, people can use wireless Wi-Fi to quickly access the Internet social, browse the web, shopping online and even games and entertainment activities. However, with the popularity of WLAN in life, the security problems are also highlighted. There are many attacks against WLAN, and the phishing attack of wireless access point (AP) is one of the serious security threats in wireless network. Wireless access point phishing attack refers to hackers using wireless devices to simulate a similar or identical pseudo-APs and configure them with the same performance indexes and attributes as the real AP, which makes the accessor unable to judge the truth and falsehood. Thus the false AP caused by the theft of passwords and other attacks. Phishing AP is called an illegal access point, not because it is not deployed by government agencies or operators, but because it is designed to steal secrets and cause damage. The phishing attack is hidden because the equipment and environment required to launch the attack are not high and the whole process of successful attack is very short. An attacker can easily launch a wireless DOS attack to block the normal connection or use a "middleman" attack to steal secrets and make use of the Wi-Fi automatic reconnection mechanism to fish the user. Intelligent terminals will choose to connect wireless hotspots in most scenarios where there are wireless hotspots, but the security and reliability of the wireless hotspots can not be judged and recognized effectively. Once the wireless hotspot of malicious phishing is accessed, it may lead to data leakage or important information disclosure in the terminal, which will bring great threat to the information security of users. Aiming at the problem of false hot spot and phishing hot spot stealing user information, most of the main mobile terminal detection methods stay at the stage of the name of hot spot and the encryption attribute of hot spot, which is called feature fingerprint detection. This detection method is less practical and is easy to be cracked by attackers. In order to ensure the security of wireless access, it is necessary to make reference to wireless security environment according to the characteristic attributes of wireless hot spots. In this paper, an active detection technique based on active detection for mobile terminal devices is designed. It can be detected by four characteristic fingerprints according to IP address of SSIDN MAC address and encryption method of wireless AP. Then, according to the different characteristics of private Wi-Fi and operator public Wi-Fi, different active detection schemes can be designed, which can make the detection of phishing attacks more accurate, and make people more comfortable to enjoy the convenience brought by wireless network. To sum up, the research of wireless security detection technology in the terminal should have a broad application prospect and great practical research value.
【学位授予单位】:西安工业大学
【学位级别】:硕士
【学位授予年份】:2016
【分类号】:TN915.08;TN925.93
,
本文编号:2181934
本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2181934.html