版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、湖南大學碩士學位論文IEEE802.1x網(wǎng)絡訪問認證技術(shù)的攻擊應對策略姓名:周輝申請學位級別:碩士專業(yè):計算機軟件與理論指導教師:謝冬青20070413IEEE802.1x 網(wǎng)絡訪問認證技術(shù)的攻擊應對策略 II Abstract Nowadays, WLAN mostly based on the standard of the IEEE802.11, however, numerous works indicated that the
2、re are some security issues such as lack of mutual authentication and weak key. In view of the current security issues on the WLAN, IEEE802.1x introduce access-control-protocols based on ports to enhance access control a
3、nd the strength of authentication. But its authentication mechanism is also one-way, and it’s easy to suffer Man-In-The-Middle (MITM) Attack, Session Hijacking and denial of service. So it’s meaningful to the improvement
4、 and application of the WLAN, by develop the authentication method of the IEEE802.1x and offer more powerful security system. Firstly, by introducing the protocol of IEEE802.11, this article analyzed the secure service,
5、weakness of authentication and the flaw of encryption. Then the author presented many problems in IEEE802.1x (Absence of mutual authentication, lack of field of the extended authenticate protocol, the flaw of the authent
6、icate mechanism and the authenticator state machine loose coupling), and discussed MITM Attack, Session Hijacking and denial of service. It is tested that above of attacks can be performed by simulated attack tests. Seco
7、ndly, to cope with the three kinds of attacks, three solutions are proposed, which include: ①Reduce the denial of service by the center manager assisting authenticator server; ②Decrease the frequency of MITM Attack by mo
8、difying format of response message; ③reduce Session Hijacking by rejecting all MAC message for disconnection when the authentication is association. Finally, the results show: the way that copes with denial of service ca
9、n distribute the resource more reasonable and control the resource consumption in the smallest range; the way that copes with MITM Attack can prevent MITM connection; the way that copes with Session Hijacking can avoid e
10、xisting Session Hijacking by restricting state machine transfer and perfecting format of the EAPOL frame. The improving solutions remedy the flaw of absence of mutual authentication in IEEE802.1x, design central manager
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 基于ieee802.1x的端口認證解析
- 基于ieee802.1x的網(wǎng)絡計費和認證系統(tǒng)的應用與研究
- 基于ieee802.1x身份認證的政務內(nèi)網(wǎng)安全體系
- 基于ieee802.1x安全認證協(xié)議的缺陷分析與改進
- 基于ieee802.1x協(xié)議的應用研究——ieee802.1x協(xié)議在以太網(wǎng)上的實現(xiàn)
- ieee802.1x在hiperlan2上的應用
- 基于ieee802.1x的校園網(wǎng)認證計費系統(tǒng)的設(shè)計與實現(xiàn)
- ieee802.1x客戶端在校園網(wǎng)認證計費系統(tǒng)中的研究與實現(xiàn)
- 基于ieee802.1x的以太網(wǎng)接入控制芯片邏輯設(shè)計
- ieee802.1x協(xié)議在局域網(wǎng)中應用的安全性研究
- 基于802.1x認證技術(shù)的研究
- 基于802.1x協(xié)議網(wǎng)絡認證技術(shù)研究與實現(xiàn)
- 802.1x認證過程
- 結(jié)合802.1x認證技術(shù)的計費網(wǎng)關(guān)的研究
- 基于802.1x協(xié)議網(wǎng)絡認證系統(tǒng)的設(shè)計與實現(xiàn)
- ieee802.1xeaptls認證方式的研究與改進
- 基于802.1x身份認證系統(tǒng)的研究
- 基于802.1x的可信網(wǎng)絡連接認證模型研究和實現(xiàn)
- 基于ieee802.1xeaptls安全認證協(xié)議的研究和改進
- 基于pic單片機的802.1x接入認證技術(shù)研究
評論
0/150
提交評論