ieee802.1x網(wǎng)絡(luò)訪問(wèn)認(rèn)證技術(shù)的攻擊應(yīng)對(duì)策略_第1頁(yè)
已閱讀1頁(yè),還剩71頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、湖南大學(xué)碩士學(xué)位論文IEEE802.1x網(wǎng)絡(luò)訪問(wèn)認(rèn)證技術(shù)的攻擊應(yīng)對(duì)策略姓名:周輝申請(qǐng)學(xué)位級(jí)別:碩士專(zhuān)業(yè):計(jì)算機(jī)軟件與理論指導(dǎo)教師:謝冬青20070413IEEE802.1x 網(wǎng)絡(luò)訪問(wèn)認(rèn)證技術(shù)的攻擊應(yīng)對(duì)策略 II Abstract Nowadays, WLAN mostly based on the standard of the IEEE802.11, however, numerous works indicated that the

2、re are some security issues such as lack of mutual authentication and weak key. In view of the current security issues on the WLAN, IEEE802.1x introduce access-control-protocols based on ports to enhance access control a

3、nd the strength of authentication. But its authentication mechanism is also one-way, and it’s easy to suffer Man-In-The-Middle (MITM) Attack, Session Hijacking and denial of service. So it’s meaningful to the improvement

4、 and application of the WLAN, by develop the authentication method of the IEEE802.1x and offer more powerful security system. Firstly, by introducing the protocol of IEEE802.11, this article analyzed the secure service,

5、weakness of authentication and the flaw of encryption. Then the author presented many problems in IEEE802.1x (Absence of mutual authentication, lack of field of the extended authenticate protocol, the flaw of the authent

6、icate mechanism and the authenticator state machine loose coupling), and discussed MITM Attack, Session Hijacking and denial of service. It is tested that above of attacks can be performed by simulated attack tests. Seco

7、ndly, to cope with the three kinds of attacks, three solutions are proposed, which include: ①Reduce the denial of service by the center manager assisting authenticator server; ②Decrease the frequency of MITM Attack by mo

8、difying format of response message; ③reduce Session Hijacking by rejecting all MAC message for disconnection when the authentication is association. Finally, the results show: the way that copes with denial of service ca

9、n distribute the resource more reasonable and control the resource consumption in the smallest range; the way that copes with MITM Attack can prevent MITM connection; the way that copes with Session Hijacking can avoid e

10、xisting Session Hijacking by restricting state machine transfer and perfecting format of the EAPOL frame. The improving solutions remedy the flaw of absence of mutual authentication in IEEE802.1x, design central manager

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論