Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/19354
標題: 植基於SVM分類方法之非法無線網路存取點偵測
Rogue Access Point Detection Based on Support Vector Machines
作者: 李岳家
Lee, Yueh-Chia
關鍵字: Rogue AP detection
非法無線網路存取點偵測
Packet analysis
Wireless packet characteristics
Support vector machines
Wireless security
封包分析
無線封包特徵
支援向量機
無線網路安全
出版社: 資訊科學系所
引用: 參考文獻 1. 中文部份 (1) 圖書 [1] 禹凡, “無線網路通訊概論”, 文魁出版社, 2002。 (2) 期刊論文 [2] 劉建良,“無線隨意行動網路上聯合防禦入侵偵測系統之研究”, 國立台灣科技大學, 碩士論文, 2004。 [3] 謝芳伶,“支援向量機於指紋辨識之應用”, 靜宜大學, 碩士論文, 2004。 (3) 網路資源 [4] 非法AP現形記, http://www.ithome.com.tw/itadm/news/news.php?c=29166 2. 西文部份 (1) Books [5] V. Vapnik, “Statistical Learning Theory,” New York, 1998. (2) Journal and Conference Articles [6] Beyah, R., Kangude, S., Yu, G., Strickland, and B., Copeland, J., "Rogue Access Point Detection using Temporal Traffic Characteristics," IEEE Global Telecommunications Conference, Vol.4, pp. 2271-2275, 2004. [7] Brown M. P.S., Groundy, W.N., Lin, D., Cristianini, N., Sugnet, C.W., Furey, T.S., Ares Jr, M., and Haussler, D., " Knowledge-based Analysis of Microarray Gene Expression Data using Support Vector Machines," Proc. of the National Academy of Sciences, Vol.97, No.1, pp. 262–267, 2000. [8] Chang, Chih-Chung., and Lin, Chih-Jen., “LIBSVM : a Library for Support Vector Machines”, 2001. (Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm) [9] Chen, L.-J., Sun, T., Yang, G., Sanadidi, and M. Gerla, M., “AdHoc Probe: Path Capacity Probing in Ad Hoc Networks” UCLA Computer Science Technical Report TR050005, 2005. [10] Cover, T. M., and Hart, P. E., “Nearest Neighbor Pattern Classification,” IEEE Transactions on Information Theory, Vol. IT-13, No. 1, pp.21-27, 1967. [11] Deng, H., Zeng, Q.-A., and Agrawal, D. P., "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks," IEEE 2003, 2003. [12] Kapoor, R., Chen, L.-J., Lao, L., Gerla, M., and Sanadidi, M. Y., “CapProbe: A Simple and Accurate Capacity Estimation Technique,” SIGCOMM, 2004. [13] Li, J., Blake, C., Couto, D., Lee, H. I., and Morris, R., “Capacity of Ad Hoc Wireless Networks,” ACM MobiCom, 2001. [14] Lin, Z.-G.,“Detection of Unlawful Wireless Access Point Based on Network Packet Analysis,” in Master Thesis of National Chung Hsing University, Taiwan, June 2005. [15] Lin, Z., and Jin, Z.,“A New Method for Measuring the Bottleneck Bandwidth”, Proceedings of the Services Computing, IEEE International Conference on (SCC''04), Vol. 00, pp. 489-493, 2004. [16] Müller, K.-R., Mika, S., Rätsch, G., Tsuda, K., and Schölkopf. B., “An Introduction to Kernel-Based Learning Algorithms”, IEEE Neural Networks, 12(2):181-201, May 2001. [17] Sun, T., Yang, G., Chen, L.-J., Sanadidi, M. Y., and Gerla, M.,“A Measurement Study of Path capacity in 802.11b based Wireless Networks,” in The Wireless Traffic Measurements and Modeling Workshop, Seattle, USA, 2005. [18] Wu, C.-L., Fu, L.-C., and Lian, F.-L., "WLAN Location Determination in e-Home via Support Vector Classification," Networking, Sensing and Control, IEEE International Conference, Vol. 2, 2004. (3) Electronic Resources [19] http://mail.eagletek.com.tw/ [20] http://manageengine.adventnet.com/products/wifi-manager/ [21] http://www.7byte.com/ [22] http://www.airdefense.net [23] http://www.airmagnet.com/ [24] http://www.ca.com/tw/ [25] http://www.dis.org/wl/maps/ [26] http://www.ethereal.com/ [27] http://www.flukenetworks.com/ [28] http://www.highwalltech.com/products.cfm?menu=hwsent&page=hwsent [29] http://www.netstumbler.com/ [30] http://www.smartit.com.tw/index.asp [31] http://www.vantechsoft.com.cn/tw/pcmainCorp.htm [32] "Rogue Access Point Detection Automatically Detect and Manage Wireless Threats to Your Network," http://www.wavelink.com/downloads/pdf/wlmobilemanager_wp_rogueap.pdf
摘要: 隨著無線網路的迅速擴展,無線訊號將遍佈任何地方,帶來了無線上網的方便,也帶來了無線網路安全的顧慮。許多使用者在體驗到無線上網的好處之後,便開始希望在自己的工作場合中也能得到相同的方便,於是等不及網管人員對於無線網路的佈建(或根本沒有佈建的計畫),乾脆自行架設無線網路存取點(access point, AP)。這些私自架設的AP通常都沒有設定任何基本的安全措施,且其所在的Switch port也不受防火牆的限制,這就是所謂的Rogue AP問題,代表著在無線網路安全上一個很大的缺口,因此Rogue AP的偵測目的就是為了要防止無線網路曝露在風險之中。 本論文有別於傳統以手持式行動裝置搜尋AP訊號等耗時費力的方式,提出一個新的網路封包分析模型,以封包特徵分析方式,結合SVM分類法高準確率的優勢,將具有無線網路特徵的封包分辨出來,協助網路管理者判斷Rogue AP的存在。 此方法可達到100%的偵測準確率,是此問題目前最好的解決方法,且不受限於AP類型與訊號範圍、獨立於802.11(a/b/g)無線技術之外,也可節省企業需額外購置昂貴的偵測設備成本,期能對於無線網路安全防護產生助益。
URI: http://hdl.handle.net/11455/19354
其他識別: U0005-1907200622540200
文章連結: http://www.airitilibrary.com/Publication/alDetailedMesh1?DocID=U0005-1907200622540200
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.