無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測(cè).doc
約7頁DOC格式手機(jī)打開展開
無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測(cè),全文約5300字論述翔實(shí)摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無線網(wǎng)絡(luò)的無縫接合方案。分析了無線網(wǎng)絡(luò)的脆弱性,介紹了wep存在的嚴(yán)重缺陷?;谔摂M專網(wǎng)技術(shù),提出了無線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無線網(wǎng)絡(luò),...


內(nèi)容介紹
此文檔由會(huì)員 癡狂少年 發(fā)布
無線校園網(wǎng)與有線網(wǎng)絡(luò)無縫結(jié)合及無線網(wǎng)絡(luò)的入侵檢測(cè)
全文約5300字 論述翔實(shí)
摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無線網(wǎng)絡(luò)的無縫接合方案。分析了無線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷。基于虛擬專網(wǎng)技術(shù),提出了無線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。
關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無線網(wǎng)絡(luò),入侵檢測(cè),無線對(duì)等協(xié)議,虛擬專網(wǎng)技術(shù)
Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN
目前存在的無線移動(dòng)網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無線網(wǎng)絡(luò)可用在軍事通信、無線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場(chǎng)以及人們希望能迅速共享信息的會(huì)議、辦公室等領(lǐng)域和場(chǎng)所。
參考文獻(xiàn)
1 劉元安.寬帶無線接入和無線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18
全文約5300字 論述翔實(shí)
摘要:本文介紹了原有線校園網(wǎng)絡(luò)與無線網(wǎng)絡(luò)的無縫接合方案。分析了無線網(wǎng)絡(luò)的脆弱性,介紹了WEP存在的嚴(yán)重缺陷。基于虛擬專網(wǎng)技術(shù),提出了無線網(wǎng)絡(luò)的安全性架構(gòu);給出了針對(duì)無線網(wǎng)絡(luò)的入侵檢測(cè)模型和網(wǎng)絡(luò)異常行為檢測(cè)策略。
關(guān)鍵詞:有線網(wǎng)絡(luò),網(wǎng)絡(luò)安全,無線網(wǎng)絡(luò),入侵檢測(cè),無線對(duì)等協(xié)議,虛擬專網(wǎng)技術(shù)
Connection of Wireless Networks and Security Architecture and Intrusion Detection Techniques of Wireless Networks
[Abstract] This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. Based on virtual private network techniques, a security architecture for wireless networks is proposed. Moreover, it presents a model of intrusion detection system and strategies for detecting anomaly behaviors.
[Keywords] Networks security; Wireless networks; Intrusion detection; WEP; VPN
目前存在的無線移動(dòng)網(wǎng)絡(luò)有兩種:第一種是基于網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),這種網(wǎng)絡(luò)的典型應(yīng)用為無線局域網(wǎng)(Wireless local-area network ,WLAN);第二種為無網(wǎng)絡(luò)基礎(chǔ)設(shè)施的網(wǎng)絡(luò),一般稱之為自組織網(wǎng)。無線網(wǎng)絡(luò)可用在軍事通信、無線通信的家庭產(chǎn)品(Home RF)。事故的突發(fā)現(xiàn)場(chǎng)以及人們希望能迅速共享信息的會(huì)議、辦公室等領(lǐng)域和場(chǎng)所。
參考文獻(xiàn)
1 劉元安.寬帶無線接入和無線局域網(wǎng)(第一版),北京:北京郵電大學(xué)出版,2000
2 IEEE Standard Committees. ANSI/IEEE Std 802.11, Part I I: Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY)
3 Heady R, Luger G, Maccabe A, et al. The Architecture of a Network Level Intrusion Detection System. Technical Report, Computer Science Department, University of New Mexico. http://citeseer.ist.psu.edu/context/65327/0一36k, 1990
4 Maltz D A, Broch J, Jetcheva J, et al. The Effects of On-demand Behavior in Routing Protocols tier Multi-hop Wireless ad Networks .IEEE Journal on Selected Areas in Communications, 1999(8): 36-41
5 Miller S K. Pacing the Challenge of Wireless Security . IEEE Computer Magazine, 2001,(7): 16-18
TA們正在看...
- 物病蟲害防治電子案全套配套張哲章植物病害基礎(chǔ)知...doc
- 物病蟲害防治電子案全套配套張哲章植物病害基礎(chǔ)知...doc
- 物病蟲害防治電子案全套配套張哲章知識(shí)能力目標(biāo).doc
- 物病蟲害防治電子案全套配套張哲附農(nóng)田雜草防除技...doc
- 物病蟲害防治電子案全套配套張哲附雜草防除技術(shù).doc
- 物病蟲害防治電子案全套配套張哲附雜草防除技術(shù)測(cè)...doc
- 物病蟲害防治電子案全套配套張哲附雜草防除技術(shù)測(cè)...doc
- 物聯(lián)網(wǎng)云平臺(tái)對(duì)外數(shù)據(jù)接口.pdf
- 物聯(lián)網(wǎng)技術(shù)導(dǎo)論+唐玉林+程全套評(píng)價(jià)標(biāo)準(zhǔn).doc
- 物聯(lián)網(wǎng)技術(shù)導(dǎo)論配套唐玉林程物聯(lián)網(wǎng)技術(shù)導(dǎo)論唐玉林...docx