国产精品婷婷久久久久久,国产精品美女久久久浪潮av,草草国产,人妻精品久久无码专区精东影业

無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè).doc

約7頁(yè)DOC格式手機(jī)打開(kāi)展開(kāi)

無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè),全文約5300字論述翔實(shí)摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無(wú)線網(wǎng)絡(luò)的無(wú)縫接合方案。分析了無(wú)線網(wǎng)絡(luò)的脆弱性,介紹了wep存在的嚴(yán)重缺陷。基于虛擬專網(wǎng)技術(shù),提出了無(wú)線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無(wú)線網(wǎng)絡(luò),...
編號(hào):10-26820大小:59.50K
分類: 論文>計(jì)算機(jī)論文

內(nèi)容介紹

此文檔由會(huì)員 癡狂少年 發(fā)布

無(wú)線校園網(wǎng)與有線網(wǎng)絡(luò)無(wú)縫結(jié)合及無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)

全文約5300字 論述翔實(shí)

摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無(wú)線網(wǎng)絡(luò)的無(wú)縫接合方案。分析了無(wú)線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無(wú)線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無(wú)線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。

關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無(wú)線網(wǎng)絡(luò),入侵檢測(cè),無(wú)線對(duì)等協(xié)議,虛擬專網(wǎng)技術(shù)

Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN

目前存在的無(wú)線移動(dòng)網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無(wú)線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無(wú)網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無(wú)線網(wǎng)絡(luò)可用在軍事通信、無(wú)線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場(chǎng)以及人們希望能迅速共享信息的會(huì)議、辦公室等領(lǐng)域和場(chǎng)所。


參考文獻(xiàn)
1 劉元安.寬帶無(wú)線接入和無(wú)線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18