国产精品婷婷久久久久久,国产精品美女久久久浪潮av,草草国产,人妻精品久久无码专区精东影业

無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測.doc

約7頁DOC格式手機打開展開

無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測,全文約5300字論述翔實摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無線網(wǎng)絡(luò)的無縫接合方案。分析了無線網(wǎng)絡(luò)的脆弱性,介紹了wep存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對無線網(wǎng)絡(luò)的入侵檢測模型和網(wǎng)絡(luò)異常行為檢測策略。關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無線網(wǎng)絡(luò),...
編號:10-26820大小:59.50K
分類: 論文>計算機論文

內(nèi)容介紹

此文檔由會員 癡狂少年 發(fā)布

無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測

全文約5300字 論述翔實

摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無線網(wǎng)絡(luò)的無縫接合方案。分析了無線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對無線網(wǎng)絡(luò)的入侵檢測模型和網(wǎng)絡(luò)異常行為檢測策略。

關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無線網(wǎng)絡(luò),入侵檢測,無線對等協(xié)議,虛擬專網(wǎng)技術(shù)

Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN

目前存在的無線移動網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無線網(wǎng)絡(luò)可用在軍事通信、無線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場以及人們希望能迅速共享信息的會議、辦公室等領(lǐng)域和場所。


參考文獻(xiàn)
1 劉元安.寬帶無線接入和無線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18