無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè).doc
約7頁(yè)DOC格式手機(jī)打開(kāi)展開(kāi)
無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè),全文約5300字論述翔實(shí)摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無(wú)線網(wǎng)絡(luò)的無(wú)縫接合方案。分析了無(wú)線網(wǎng)絡(luò)的脆弱性,介紹了wep存在的嚴(yán)重缺陷。基于虛擬專網(wǎng)技術(shù),提出了無(wú)線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無(wú)線網(wǎng)絡(luò),...
內(nèi)容介紹
此文檔由會(huì)員 癡狂少年 發(fā)布
無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)
全文約5300字 論述翔實(shí)
摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無(wú)線網(wǎng)絡(luò)的無(wú)縫接合方案。分析了無(wú)線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無(wú)線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。
關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無(wú)線網(wǎng)絡(luò),入侵檢測(cè),無(wú)線對(duì)等協(xié)議,虛擬專網(wǎng)技術(shù)
Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN
目前存在的無(wú)線移動(dòng)網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無(wú)線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無(wú)網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無(wú)線網(wǎng)絡(luò)可用在軍事通信、無(wú)線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場(chǎng)以及人們希望能迅速共享信息的會(huì)議、辦公室等領(lǐng)域和場(chǎng)所。
參考文獻(xiàn)
1 劉元安.寬帶無(wú)線接入和無(wú)線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18
全文約5300字 論述翔實(shí)
摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無(wú)線網(wǎng)絡(luò)的無(wú)縫接合方案。分析了無(wú)線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無(wú)線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。
關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無(wú)線網(wǎng)絡(luò),入侵檢測(cè),無(wú)線對(duì)等協(xié)議,虛擬專網(wǎng)技術(shù)
Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN
目前存在的無(wú)線移動(dòng)網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無(wú)線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無(wú)網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無(wú)線網(wǎng)絡(luò)可用在軍事通信、無(wú)線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場(chǎng)以及人們希望能迅速共享信息的會(huì)議、辦公室等領(lǐng)域和場(chǎng)所。
參考文獻(xiàn)
1 劉元安.寬帶無(wú)線接入和無(wú)線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18
TA們正在看...
- bs2485-1987中文版t形槽、t形螺栓、t形螺母與榫舌...doc
- qdj16011-1998波齒復(fù)合墊的標(biāo)準(zhǔn).xls
- qs9000-2001質(zhì)量體系要求(中文第三版).doc
- gsp實(shí)訓(xùn)項(xiàng)目設(shè)計(jì)方案.doc
- 壓力容器產(chǎn)品出廠質(zhì)量證明文件-tsgr0004-2009《固...ppt
- tsgd0001-2009ppt壓力管道安全技術(shù)監(jiān)察規(guī)程-工業(yè)管...ppt
- tsgt7010-2004電梯安全鉗型式試驗(yàn)細(xì)則(報(bào)批稿).doc
- bsen462-1-1994中英文版無(wú)損檢測(cè)-射線底片質(zhì)第1部...doc
- dn250粉塵用金屬密封球閥裝配.dwg
- 市教育局關(guān)工委工作要點(diǎn).doc