版权说明 操作指南
首页 > 成果 > 成果详情

Research of Intrusion and Monitoring Based on Wireless LAN

认领
导出
Link by DOI
反馈
分享
QQ微信 微博
成果类型:
期刊论文、会议论文
作者:
Che, ShengBing*;Jin, Shuai
通讯作者:
Che, ShengBing
作者机构:
[Jin, Shuai; Che, ShengBing] Cent S Univ Forestry & Technol, Coll Comp & Informat Engn, Changsha 410004, Hunan, Peoples R China.
通讯机构:
[Che, ShengBing] C
Cent S Univ Forestry & Technol, Coll Comp & Informat Engn, Changsha 410004, Hunan, Peoples R China.
语种:
英文
关键词:
Computer Forensics;Remote Monitoring;WEP Protocol;WLAN
期刊:
Advances in Intelligent and Soft Computing
ISSN:
1867-5662
年:
2012
卷:
159 AISC
期:
VOL. 1
页码:
621-628
会议名称:
Future Computer and Control Systems, FCCS 2012
会议论文集名称:
Advances in Intelligent and Soft Computing
会议时间:
21 April 2012 through 22 April 2012
会议地点:
Changsha, PEOPLES R CHINA
会议主办单位:
[Che, ShengBing;Jin, Shuai] Cent S Univ Forestry & Technol, Coll Comp & Informat Engn, Changsha 410004, Hunan, Peoples R China.
会议赞助商:
Int Sci & Educ Res Assoc, VIP Informat Conf Ctr, Beijing Gireda Res Ctr
主编:
Jin, D Lin, S
出版地:
HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
出版者:
SPRINGER-VERLAG BERLIN
ISBN:
9783642293863
机构署名:
本校为第一且通讯机构
院系归属:
计算机与信息工程学院
摘要:
By analyzing the vulnerabilities of IEEE 802.11 protocol, and based on the scheme of capturing, filtering and analyzing frames, the algorithm for cracking WEP protocol key was put forward to intruding the target host in WLAN. Then combined with the key technologies of Trojans such as the covert and anti-killing, a remote monitoring framework based on the mechanism of Trojans was designed. According to practical requirements, some forensics methods were provided in the framework such as screen monitoring and file management. Experiments results show that the forensics system was of high reliabi...

反馈

验证码:
看不清楚,换一个
确定
取消

成果认领

标题:
用户 作者 通讯作者
请选择
请选择
确定
取消

提示

该栏目需要登录且有访问权限才可以访问

如果您有访问权限,请直接 登录访问

如果您没有访问权限,请联系管理员申请开通

管理员联系邮箱:yun@hnwdkj.com