期刊文献+

强健安全网络中的中间人攻击研究 被引量:7

Research of man-in-the-middle attack in robust security network
在线阅读 下载PDF
导出
摘要 中间人(MitM)攻击是强健安全网络(RSN)面临的一类严重安全威胁。参照802.1X-2004认证者和申请者状态机模型,从RSN关联建立过程的整体视角,对RSN中MitM攻击进行系统性分析。指出现有关于RSN中MitM攻击问题研究方面存在片面性,提出RSN中一个MitM攻击的框架和有效攻击条件,并给出该框架下一个有效攻击实例。分析结果表明,RSN采用强双向认证方法时可抗MitM攻击,未采用强双向认证方法时易遭MitM攻击。 Man-in-the-Middle(MitM) attacks pose severe threats to the Robust Security Network(RSN).Based on the state machine model of the authenticator and supplicant in 802.1X-2004,MitM attacks were analyzed systematically from the respect of the whole establishment of RSN associations.With the unilateral cognition of the MitM attacks in RSN clarified,a framework for the MitM attacks in RSN and its conditions of the effective launch of the attacks were brought forward,which were fully verified by an effective attack instance.The analytical results reveal that RSN can withstand MitM attacks if strong mutual authentication methods are adopted;otherwise it is vulnerable to this threat.
出处 《计算机应用》 CSCD 北大核心 2012年第1期42-44,65,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61073042) 黑龙江科研启动资金资助项目(LBH-Q10141) 黑龙江省教育厅科学技术研究项目(12513049) 北京邮电大学网络与交换技术国家重点实验室开放课题(SKLNST-2009-1-10)
关键词 中间人攻击 强健安全网络 状态机 攻击框架 可扩展认证协议 Man-in-the-Middle(MitM) attack Robust Security Network(RSN) state machine attack framework Extensible Authentication Protocol(EAP)
  • 相关文献

参考文献15

  • 1D.M.Bui,I.Kunze and S.F?rster et al.cloning and expression of an Arxula adeinivorans glucoamylase gene in saccharomyces cerevisiae[J].Appl.Microbiol.Biotechnol,1996,44:610-619.
  • 2H.P.Fierobe,E. Mirgorodskaya and T. P.Frandsen.et al.Over expression and characterization of Aspergillus awamori wild-type and matant glucoamylase secreted by the methylotrophic yeast pichia pstoris:comparison with wild-type recombinant glucoamylase produ
  • 3ABOBA B, BLUNK L, VOLLBRECHT J, et al. IETF RFC 3748, Extensible Authentication Protocol (EAP) [S]. Reston: IETF, 2004.
  • 4WANG L, SRINIVASAN B, BHATTACHAP, JEE N. Security analysis and improvements on WLANs [J]. Journal of Networks, 2011, 6(3): 470 -481.
  • 5周超,周城,郭亮.IEEE 802.1X的安全性分析及改进[J].计算机应用,2011,31(5):1265-1270. 被引量:7
  • 6IEEE-SA. IEEE Std 802.1X-2001, port-based network access control [S]. Washington, DC: IEEE Computer Society, 2001.
  • 7TURAB N, MOLDOVE F. A comparison between wireless LAN security protocols [J]. Eleetrieal Engineering and Computer Science, 2009, 71(1): 61-80.
  • 8LEI J, FU X M, HOGREF D, et al. Comparative studies on authentication and key exchange methods for 802. 11 wireless LAN [J]. Computers and Security, 2007, 26(5): 401-409.
  • 9DANTU R, CLOTHIER G, ATRI A. EAP methods for wireless networks [J]. Computer Standards and Interfaces, 2007, 29(3): 289 - 301.
  • 10宋宇波,胡爱群,姚冰心.802.11i认证协议可验安全性形式化分析[J].中国工程科学,2010,12(1):67-73. 被引量:4

二级参考文献30

  • 1周贤伟,刘宁,覃伯平.IEEE 802.1x协议的认证机制及其改进[J].计算机应用,2006,26(12):2894-2896. 被引量:18
  • 2IEEE Std. 802.11i/D2.0. Specification for Enhanced Security[S]. 2002-03.
  • 3IEEE Std. 802.1X. IEEE Standard for Local and Metropolitan Area Network Port Based Network Access Control[S]. 2001.
  • 4Blunk L, Vollbrecht J. PPP Extensible Authentication Protocol[S]. RFC 2284, 1998-03.
  • 5Aboba B, Simon D. PPP EAP TLS Authentication Protocol[S]. RFC 2716, 1998-10.
  • 6Wang Xiaoyun, Yu Hongbo. How to Break MD5 and Other Hash Function[C]//Proc. of Advances in EUROCRYPT'05. Santa Barbara, USA: [s. n.], 2005.
  • 7IEEE 802.11. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements - Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specifications [ S ]. America, ISO/IEC, 1999,17 - 21.
  • 8Nikita Borisov, Ian Goldberg, David Wagner. Intercepting mobile communications: the insecurity of 802. 11 [A]. MobiCom' 01: Proceedings of the 7^th Annual International Conference on Mobile Computing and Networking[ C ]. New York : ACM Press,2001 : 180- 189.
  • 9Arbaugh W A, Shankar N, Wan Y J . Your 802.11 wireless network has no clothes [ EB/OL]. http://www. cs. umd. edu/ waa/wireless.pdf,2001,3.
  • 10Arbaugh W A. An inductive chosen plalntext attack against WEP/ WEP2[ N]. IEEE Document 802.11 -01/230,2001,5.

共引文献14

同被引文献36

引证文献7

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部