TY - JOUR
T1 - Detector of the WLAN security and management distributed system
AU - Wang, Haifeng
AU - Shu, Minglei
AU - Lu, Jialiang
AU - Chen, Jing
AU - Li, Guodong
AU - Li, Chunjie
PY - 2008/9
Y1 - 2008/9
N2 - Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.
AB - Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.
UR - http://www.scopus.com/inward/record.url?scp=54049116703&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=54049116703&partnerID=8YFLogxK
M3 - Article
AN - SCOPUS:54049116703
SN - 0254-3087
VL - 29
SP - 1939
EP - 1944
JO - Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument
JF - Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument
IS - 9
ER -