[1]夏国卿,李长远,苏子松,等. 基于设备指纹的无线钓鱼接入点识别方法研究[J].计算机技术与发展,2015,25(01):143-146.
 XIA Guo-qing,LI Chang-yuan,SU Zi-song,et al. Research on Wireless Rogue AP Recognition Method Based on Device Fingerprinting[J].,2015,25(01):143-146.
点击复制

 基于设备指纹的无线钓鱼接入点识别方法研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年01期
页码:
143-146
栏目:
安全与防范
出版日期:
2015-01-10

文章信息/Info

Title:
 Research on Wireless Rogue AP Recognition Method Based on Device Fingerprinting
文章编号:
1673-629X(2015)01-0143-04
作者:
 夏国卿李长远苏子松陈伟
 南京邮电大学 计算机学院
Author(s):
 XIA Guo-qingLI Chang-yuanSU Zi-songCHEN Wei
关键词:
 无线局域网钓鱼攻击AP识别设备指纹
Keywords:
 wireless local area networkphishing attackAP identificationequipment fingerprints
分类号:
TP393
文献标志码:
A
摘要:
 无线局域网因其架设方便、易于扩展的特点获得了较快的发展,而针对无线局域网的攻击形式也逐渐增多。无线钓鱼攻击是指攻击者架设一个伪装的无线接入点,诱骗用户连接从而进一步窃取用户敏感信息或发动其他主动攻击。文中针对无线局域网中的虚假钓鱼AP攻击提出一种基于设备指纹的AP识别方法。通过向AP发送一系列探测请求帧,记录AP对不同帧的响应结果作为识别AP的特征信息,以此区分合法AP与非法钓鱼AP。实验结果表明基于设备指纹的钓鱼AP检测方法能有效地检测出无线钓鱼AP设备。
Abstract:
 Wireless local area network has gained fast development these years due to its being easy to set up and extend. There have more and more WLAN threats. Wireless phishing attack occurs when an attacker sets up a wireless access point disguised to trick the user to connect. Then the attacker can further steal sensitive information or launch other active attacks. In this paper,present an AP fingerprints i-dentification method based on equipment fingerprints for WLAN rogue AP phishing attacks. The proposed method sends a series of probe request frame to the AP,then records the response of different frames as the identification feature information of an AP,in order to distin-guish between the legal AP and illegal fishing AP. Experimental results show that phishing AP detection method based on equipment fin-gerprints can effectively detect wireless phishing AP.

相似文献/References:

[1]刘晓莹 王一 王新安.应用于无线局域网的高速维特比译码器电路[J].计算机技术与发展,2008,(01):11.
 LIU Xiao-ying,WANG Yi,WANG Xin-an.A High Speed Viterbi Circuit Implementation for WLAN System[J].,2008,(01):11.
[2]刘可 徐昌彪 杨士中.无线局域网中的认证机制[J].计算机技术与发展,2008,(01):164.
 LIU Ke,XU Chang-biao,YANG Shi-zhong.Authentication Mechanisms in WLAN[J].,2008,(01):164.
[3]周炜 褚伟.基于Linux的无线局域网协议解析器的设计[J].计算机技术与发展,2008,(03):217.
 ZHOU Wei,CHU Wei.Design of WLAN Protocol Parser Based on Linux[J].,2008,(01):217.
[4]姜永 郑明春 李国强.IEEE802.16中的无线Mesh网络研究[J].计算机技术与发展,2008,(05):234.
 JIANG Yong,ZHENG Ming-chun,LI Guo-qiang.Research on Wireless Mesh Network in IEEE802.16[J].,2008,(01):234.
[5]刘晓明 邓锋 谢李蓉.基于μC/OS-II的IEEE802.11 MAC协议的实现[J].计算机技术与发展,2008,(08):26.
 LIU Xiao-ming,DENG Feng,XIE Li-rong.Realization of IEEE802.11 MAC Protocol Based on μC/OS-II[J].,2008,(01):26.
[6]陈群 周健.无线局域网安全认证的EAP策略[J].计算机技术与发展,2008,(09):123.
 CHEN Qun,ZHOU Jian.EAP Strategy of WLAN's Security Authentication[J].,2008,(01):123.
[7]司纪锋 王美琴 曹宝香.无线局域网MAC地址欺骗攻击的检测[J].计算机技术与发展,2006,(02):232.
 SI Ji-feng,WANG Mei-qin,CAO Bao-xiang.Detecting Wireless LAN MAC Address Spoofing Attack[J].,2006,(01):232.
[8]王莉 刘志愚 刘一兰[].无线局域网WEP协议安全隐患分析[J].计算机技术与发展,2006,(08):55.
 WANG Li,LIU Zhi-yu,LIU Yi-lan.Analysis on Secure Hidden Troubles of Wireless Local Area Network's WEP[J].,2006,(01):55.
[9]邢长明 刘方爱 杨林.无线局域网中非法设备检测方案的设计与实现[J].计算机技术与发展,2006,(10):128.
 XING Chang-ming,LIU Fang-ai,YANG Lin.A Design and Realization of a Rogue - Device Detecting Project in WLAN[J].,2006,(01):128.
[10]殷安生.基于802.11i的WLAN安全认证机制研究与实现[J].计算机技术与发展,2010,(09):127.
 YIN An-sheng.Research and Implementation on Secure Authentication Mechanism of WLAN Based on 802.11i Protocol[J].,2010,(01):127.
[11]张冬梅,张有根. 无线局域网组播优化分组算法[J].计算机技术与发展,2014,24(11):65.
 ZHANG Dong-mei,ZHANG You-gen. Wireless LAN Multicast Optimization Grouping Algorithm[J].,2014,24(01):65.
[12]姜绍君,王颖. 基于CSMA/CA协议的隐藏终端问题的改进[J].计算机技术与发展,2015,25(01):33.
 JIANG Shao-jun,WANG Ying. Improvement of Hidden Terminal Problem Based on CSMA/CA Protocol[J].,2015,25(01):33.
[13]陶峥[] ],王洪玉[]. 基于卡方距离改进的WLAN室内定位算法[J].计算机技术与发展,2016,26(09):50.
 TAO Zheng[][],WANG Hong-yu[]. Improved WLAN Localization Algorithm Based on Chi-square Distance[J].,2016,26(01):50.

更新日期/Last Update: 2015-04-17