首页> 外文会议>International conference on future computer and control systems;FCCS2012 >Research of Intrusion and Monitoring Based on Wireless LAN
【24h】

Research of Intrusion and Monitoring Based on Wireless LAN

机译:基于无线局域网的入侵与监控研究

获取原文

摘要

By analyzing the vulnerabilities of IEEE 802.1 I protocol, and based on the scheme of capturing, filtering and analyzing frames, the algorithm for cracking WEP protocol key was put forward to intruding the target host in WLAN. Then combined with the key technologies of Trojans such as the covert and anti-killing, a remote monitoring framework based on the mechanism of Trojans was designed. According to practical requirements, some forensics methods were provided in the framework such as screen monitoring and file management. Experiments results show that the forensics system was of high reliability and strong survival ability, and achieved the purpose of real-time, covert and active forensics.
机译:通过分析IEEE 802.1 I协议的漏洞,并基于捕获,过滤和分析帧的方案,提出了破解WEP协议密钥的算法,以入侵无线局域网中的目标主机。然后结合特洛伊木马的隐秘,杀伤等关键技术,设计了基于特洛伊木马机制的远程监控框架。根据实际需要,在框架中提供了一些取证方法,例如屏幕监视和文件管理。实验结果表明,该取证系统具有较高的可靠性和较强的生存能力,达到了实时,隐蔽和主动取证的目的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号