A Study on Intrusion Detection System for 802.11 Wireless LAN
碩士 === 長庚大學 === 資訊管理研究所 === 92 === The use of Wireless Local Area Network (Wireless LAN, WLAN) has provided enough convenience, but there are actually security concerns in using it. In the paper "Your 802.11 Wireless Network Has No Clothes", published by William A. Arbaugh, Narendar Shanka...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2004
|
Online Access: | http://ndltd.ncl.edu.tw/handle/93512569415837664488 |
id |
ndltd-TW-092CGU00396013 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-092CGU003960132016-01-04T04:08:37Z http://ndltd.ncl.edu.tw/handle/93512569415837664488 A Study on Intrusion Detection System for 802.11 Wireless LAN 802.11無線區域網路入侵偵測系統之研究 bob 蘇建誠 碩士 長庚大學 資訊管理研究所 92 The use of Wireless Local Area Network (Wireless LAN, WLAN) has provided enough convenience, but there are actually security concerns in using it. In the paper "Your 802.11 Wireless Network Has No Clothes", published by William A. Arbaugh, Narendar Shankar and Y. C. Justin Wan in 2001, they pointed out the security threats of wireless LAN. Therefore, the security of wireless LAN will inevitably become an important issue in the enterprise information security management due to the gradual popularization of wireless LAN. Nowadays, most researches of wireless LAN security are focused on the flaws of Wired Equivalent Privacy (WEP), and the research of using intrusion detection techniques to enhance the wireless LAN security is minor. Because wireless LAN is the extending of wired network, there is network traffic when using, and network activities can be observed and analyzed by taking advantage of network traffic. By doing analysis of network traffic records, we can detect anomaly behavior in the network, and provide important monitoring information to network administrator. Moreover, by recording the connection flows and related frame fields of wireless LAN, we can provide monitoring and auditing for wireless network security. In this research, we develop a prototype of passive network traffic monitoring system by using the anomaly detection methods of intrusion detection to monitor network packets, discover the unauthorized users, detect the anomaly networking behaviors, and enhance the wireless network security. 陳昱仁 2004 學位論文 ; thesis 75 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 長庚大學 === 資訊管理研究所 === 92 === The use of Wireless Local Area Network (Wireless LAN, WLAN) has provided enough convenience, but there are actually security concerns in using it. In the paper "Your 802.11 Wireless Network Has No Clothes", published by William A. Arbaugh, Narendar Shankar and Y. C. Justin Wan in 2001, they pointed out the security threats of wireless LAN. Therefore, the security of wireless LAN will inevitably become an important issue in the enterprise information security management due to the gradual popularization of wireless LAN.
Nowadays, most researches of wireless LAN security are focused on the flaws of Wired Equivalent Privacy (WEP), and the research of using intrusion detection techniques to enhance the wireless LAN security is minor.
Because wireless LAN is the extending of wired network, there is network traffic when using, and network activities can be observed and analyzed by taking advantage of network traffic. By doing analysis of network traffic records, we can detect anomaly behavior in the network, and provide important monitoring information to network administrator. Moreover, by recording the connection flows and related frame fields of wireless LAN, we can provide monitoring and auditing for wireless network security.
In this research, we develop a prototype of passive network traffic monitoring system by using the anomaly detection methods of intrusion detection to monitor network packets, discover the unauthorized users, detect the anomaly networking behaviors, and enhance the wireless network security.
|
author2 |
陳昱仁 |
author_facet |
陳昱仁 bob 蘇建誠 |
author |
bob 蘇建誠 |
spellingShingle |
bob 蘇建誠 A Study on Intrusion Detection System for 802.11 Wireless LAN |
author_sort |
bob |
title |
A Study on Intrusion Detection System for 802.11 Wireless LAN |
title_short |
A Study on Intrusion Detection System for 802.11 Wireless LAN |
title_full |
A Study on Intrusion Detection System for 802.11 Wireless LAN |
title_fullStr |
A Study on Intrusion Detection System for 802.11 Wireless LAN |
title_full_unstemmed |
A Study on Intrusion Detection System for 802.11 Wireless LAN |
title_sort |
study on intrusion detection system for 802.11 wireless lan |
publishDate |
2004 |
url |
http://ndltd.ncl.edu.tw/handle/93512569415837664488 |
work_keys_str_mv |
AT bob astudyonintrusiondetectionsystemfor80211wirelesslan AT sūjiànchéng astudyonintrusiondetectionsystemfor80211wirelesslan AT bob 80211wúxiànqūyùwǎnglùrùqīnzhēncèxìtǒngzhīyánjiū AT sūjiànchéng 80211wúxiànqūyùwǎnglùrùqīnzhēncèxìtǒngzhīyánjiū AT bob studyonintrusiondetectionsystemfor80211wirelesslan AT sūjiànchéng studyonintrusiondetectionsystemfor80211wirelesslan |
_version_ |
1718158473066184704 |