Please use this identifier to cite or link to this item:
標題: 植基於SVM分類方法之非法無線網路存取點偵測
Rogue Access Point Detection Based on Support Vector Machines
作者: 李岳家 
Lee, Yueh-Chia 
關鍵字: Rogue AP detection;非法無線網路存取點偵測;Packet analysis;Wireless packet characteristics;Support vector machines;Wireless security;封包分析;無線封包特徵;支援向量機;無線網路安全
出版社: 資訊科學系所
引用: 參考文獻 1. 中文部份 (1) 圖書 [1] 禹凡, “無線網路通訊概論”, 文魁出版社, 2002。 (2) 期刊論文 [2] 劉建良,“無線隨意行動網路上聯合防禦入侵偵測系統之研究”, 國立台灣科技大學, 碩士論文, 2004。 [3] 謝芳伶,“支援向量機於指紋辨識之應用”, 靜宜大學, 碩士論文, 2004。 (3) 網路資源 [4] 非法AP現形記, 2. 西文部份 (1) Books [5] V. Vapnik, “Statistical Learning Theory,” New York, 1998. (2) Journal and Conference Articles [6] Beyah, R., Kangude, S., Yu, G., Strickland, and B., Copeland, J., "Rogue Access Point Detection using Temporal Traffic Characteristics," IEEE Global Telecommunications Conference, Vol.4, pp. 2271-2275, 2004. [7] Brown M. P.S., Groundy, W.N., Lin, D., Cristianini, N., Sugnet, C.W., Furey, T.S., Ares Jr, M., and Haussler, D., " Knowledge-based Analysis of Microarray Gene Expression Data using Support Vector Machines," Proc. of the National Academy of Sciences, Vol.97, No.1, pp. 262–267, 2000. [8] Chang, Chih-Chung., and Lin, Chih-Jen., “LIBSVM : a Library for Support Vector Machines”, 2001. (Software available at [9] Chen, L.-J., Sun, T., Yang, G., Sanadidi, and M. Gerla, M., “AdHoc Probe: Path Capacity Probing in Ad Hoc Networks” UCLA Computer Science Technical Report TR050005, 2005. [10] Cover, T. M., and Hart, P. E., “Nearest Neighbor Pattern Classification,” IEEE Transactions on Information Theory, Vol. IT-13, No. 1, pp.21-27, 1967. [11] Deng, H., Zeng, Q.-A., and Agrawal, D. P., "SVM-based Intrusion Detection System for Wireless Ad Hoc Networks," IEEE 2003, 2003. [12] Kapoor, R., Chen, L.-J., Lao, L., Gerla, M., and Sanadidi, M. Y., “CapProbe: A Simple and Accurate Capacity Estimation Technique,” SIGCOMM, 2004. [13] Li, J., Blake, C., Couto, D., Lee, H. I., and Morris, R., “Capacity of Ad Hoc Wireless Networks,” ACM MobiCom, 2001. [14] Lin, Z.-G.,“Detection of Unlawful Wireless Access Point Based on Network Packet Analysis,” in Master Thesis of National Chung Hsing University, Taiwan, June 2005. [15] Lin, Z., and Jin, Z.,“A New Method for Measuring the Bottleneck Bandwidth”, Proceedings of the Services Computing, IEEE International Conference on (SCC''04), Vol. 00, pp. 489-493, 2004. [16] Müller, K.-R., Mika, S., Rätsch, G., Tsuda, K., and Schölkopf. B., “An Introduction to Kernel-Based Learning Algorithms”, IEEE Neural Networks, 12(2):181-201, May 2001. [17] Sun, T., Yang, G., Chen, L.-J., Sanadidi, M. Y., and Gerla, M.,“A Measurement Study of Path capacity in 802.11b based Wireless Networks,” in The Wireless Traffic Measurements and Modeling Workshop, Seattle, USA, 2005. [18] Wu, C.-L., Fu, L.-C., and Lian, F.-L., "WLAN Location Determination in e-Home via Support Vector Classification," Networking, Sensing and Control, IEEE International Conference, Vol. 2, 2004. (3) Electronic Resources [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] "Rogue Access Point Detection Automatically Detect and Manage Wireless Threats to Your Network,"
隨著無線網路的迅速擴展,無線訊號將遍佈任何地方,帶來了無線上網的方便,也帶來了無線網路安全的顧慮。許多使用者在體驗到無線上網的好處之後,便開始希望在自己的工作場合中也能得到相同的方便,於是等不及網管人員對於無線網路的佈建(或根本沒有佈建的計畫),乾脆自行架設無線網路存取點(access point, AP)。這些私自架設的AP通常都沒有設定任何基本的安全措施,且其所在的Switch port也不受防火牆的限制,這就是所謂的Rogue AP問題,代表著在無線網路安全上一個很大的缺口,因此Rogue AP的偵測目的就是為了要防止無線網路曝露在風險之中。

本論文有別於傳統以手持式行動裝置搜尋AP訊號等耗時費力的方式,提出一個新的網路封包分析模型,以封包特徵分析方式,結合SVM分類法高準確率的優勢,將具有無線網路特徵的封包分辨出來,協助網路管理者判斷Rogue AP的存在。

其他識別: U0005-1907200622540200
Appears in Collections:資訊科學與工程學系所

Show full item record

Google ScholarTM


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.