Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们 横山亮次奖 百年刊庆
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  横山亮次奖  |  百年刊庆
清华大学学报(自然科学版)  2020, Vol. 60 Issue (5): 371-379    DOI: 10.16511/j.cnki.qhdxxb.2020.25.007
  专题:漏洞分析与风险评估 本期目录 | 过刊浏览 | 高级检索 |
面向无线局域网接入设备的安全等级评估系统
张明远1, 武威2,3, 宋宇波2,3, 胡爱群2,3
1. 国家无线电监测中心 检测中心, 北京 100041;
2. 东南大学 网络空间安全学院, 江苏省计算机网络技术重点实验室, 南京 211189;
3. 网络通信与安全紫金山实验室, 南京 211189
Security level evaluation system for wireless local area network access devices
ZHANG Mingyuan1, WU Wei2,3, SONG Yubo2,3, HU Aiqun2,3
1. Testing Center, The State Radio Monitoring Center, Beijing 100041, China;
2. Jiangsu Key Laboratory of Computer Networking Technology, School of Cyber Science and Engineering, Southeast University, Nanjing 211189, China;
3. Purple Mountain Laboratories, Nanjing 211189, China
全文: PDF(2014 KB)  
输出: BibTeX | EndNote (RIS)      
摘要 无线局域网(wireless local area network,WLAN)接入设备是网络拓扑的关键部分,需要进行全面的安全性能分析。目前针对无线局域网的安全评估方法会受到网络环境因素影响,不适用于接入设备的安全性能评估。该文设计实现了一个针对WLAN接入设备的安全等级评估系统,融合安全功能评估和漏洞评估,基于半定量和定量相结合的分析方法实现了与应用环境安全性无关的设备安全等级评估。通过对多个主流品牌设备的评估实验,结果表明该评估系统可有效实现WLAN接入设备的安全等级自动评估,有一定实用价值。
服务
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章
张明远
武威
宋宇波
胡爱群
关键词 无线局域网(WLAN)安全等级评估漏洞评估模糊测试    
Abstract:Wireless local area network (WLAN) access devices are critical parts of a network topology that require comprehensive security performance analyses. Security assessment methods for WLAN devices are affected by network environmental factors that limit security performance evaluations of access devices. This paper presents a security level assessment system for WLAN access devices that integrates security function assessments with vulnerability assessments in a device security level assessment that is independent of the application environment security based on a combination of semi-quantitative and quantitative analyses methods. Tests with several mainstream brand devices show that the evaluation system can automatically evaluate the security level of WLAN access devices.
Key wordswireless local area network (WLAN)    security level evaluation    vulnerability assessment    fuzzing test
收稿日期: 2019-06-10      出版日期: 2020-04-26
基金资助:宋宇波,副教授,E-mail:songyubo@seu.edu.cn
引用本文:   
张明远, 武威, 宋宇波, 胡爱群. 面向无线局域网接入设备的安全等级评估系统[J]. 清华大学学报(自然科学版), 2020, 60(5): 371-379.
ZHANG Mingyuan, WU Wei, SONG Yubo, HU Aiqun. Security level evaluation system for wireless local area network access devices. Journal of Tsinghua University(Science and Technology), 2020, 60(5): 371-379.
链接本文:  
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2020.25.007  或          http://jst.tsinghuajournals.com/CN/Y2020/V60/I5/371
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
[1] 刘永磊, 金志刚, 杜磊. 开放接入点的安全可信接入[J]. 计算机工程与应用, 2016, 52(6):99-101, 106.LIU Y L, JIN Z G, DU L. Secure and trusted access for access point (AP) in open system authentication[J]. Computer Engineering and Applications, 2016, 52(6):99-101, 106. (in Chinese)
[2] PRADEEPKUMAR B, TALUKDAR K, CHOUDHURY B, et al. Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength[C]//2017 International Conference on Advances in Computing, Communications and Informatics. Udupi, India:IEEE, 2017:1981-1986.
[3] 王龙华. 基于OpenWRT的无线网络安全检测系统的设计与实现[D]. 北京:北京邮电大学, 2017.WANG L H. Design and implementation of wireless network security detection system based on OpenWRT[D]. Beijing:Beijing University of Posts and Telecommunications, 2017. (in Chinese)
[4] LI J, YUAN K, ZHOU L, et al. A detection method of WLAN security mechanisms based on MAC frame resolution[J]. Wuhan University Journal of Natural Sciences, 2017, 22(2):93-102.
[5] LIU S D, LIU Y L, JIN Z G. Attack behavioural analysis and secure access for wireless access point (AP) in open system authentication[C]//2017 13th International Wireless Communications and Mobile Computing Conference. Valencia, Spain:IEEE, 2017:741-746.
[6] HUANG H Q, HU Y J, JA Y, et al. A whole-process WiFi security perception software system[C]//2017 International Conference on Circuits, System and Simulation (ICCSS). London, UK:IEEE, 2017:151-156.
[7] MISTRY D M, VERMA S. Evaluation of performance of flooding attack in Ad hoc network[J]. International Journal of Engineering Research & Technology, 2012, 1(4):1-4.
[8] BANDARU S. Investigating the effect of jamming attacks on wireless LANS[J]. International Journal of Computer Applications, 2014, 99(14):5-9.
[9] 刘勇. 针对WLAN攻击的效能评估技术研究[D]. 西安:西安电子科技大学, 2017.LIU Y. A research of effectiveness evaluation for wireless local area networks attack[D]. Xi'an:Xidian University, 2017. (in Chinese)
[10] 王亚超. 基于层次分析的无线网络安全风险评估方法[D]. 天津:中国民航大学, 2015.WANG Y C. Wireless network security risk assessment method based on 4-layer risk analytic hierarchy[D]. Tianjin:Civil Aviation University of China, 2015. (in Chinese)
[11] WANG D, ZHOU M. A framework to test reliability and security of WiFi device[C]//Proceedings of the 15th International Conference on Electronic Packaging Technology. Chengdu, China:IEEE, 2014:953-958.
[12] MENDONCA M. Vulnerability detection in device drivers[D]. Lisbon, Portugal:University of Lisbon, 2017.
[13] VANHOEF M, SCHEPERS D, PIESSENS F. Discovering logical vulnerabilities in the WiFi handshake using model-based testing[C]//Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. New York, USA:ACM, 2017:360-371.
[14] SOEWITO B, HIRZI. Building secure wireless access point based on certificate authentication and firewall captive portal[J]. EPJ Web of Conferences, 2014, 68:29.
[15] 张人上, 李雅韵, 安俊娥. 基于加密机制模式的无线路由器网络安全设计[J]. 火力与指挥控制, 2016, 41(8):169-173.ZHANG R S, LI Y Y, AN J E. Research and design of wireless router network security based on encryption mechanisms[J]. Fire Control & Command Control, 2016, 41(8):169-173. (in Chinese)
[16] 沈祥修, 李永忠. 无线路由器安全性研究与优化[J]. 通信技术, 2018, 51(1):195-199.SHEN X X, LI Y Z. Research and optimization of WiFi router security[J]. Communications Technology, 2018, 51(1):195-199. (in Chinese)
[17] SUTTON M, GREENE A, AMINI P. Fuzzing:Brute force vulnerability discovery[M]. Massachusetts:Addison-Wesley Professional, 2007.
[18] 王强, 孟浩华. 一种融合CVSS的信息安全终端安全评估模型[J]. 计算机与数字工程, 2016, 44(4):675-682.WANG Q, MENG H H. Information security evaluation model with CVSS[J]. Computer & Digital Engineering, 2016, 44(4):675-682. (in Chinese)
[19] CVE-search[EB/OL].[2019-01-23]. https://github.com/cve-search/cve-search.
[1] 赵刚, 于悦, 黄敏桓, 王玉迎, 王嘉捷, 孙晓霞. PDF阅读器字体解析引擎的测试方法[J]. 清华大学学报(自然科学版), 2018, 58(3): 266-271.
[2] 邹权臣, 张涛, 吴润浦, 马金鑫, 李美聪, 陈晨, 侯长玉. 从自动化到智能化:软件漏洞挖掘技术进展[J]. 清华大学学报(自然科学版), 2018, 58(12): 1079-1094.
[3] 伊胜伟, 张翀斌, 谢丰, 熊琦, 向憧, 梁露露. 基于Peach的工业控制网络协议安全分析[J]. 清华大学学报(自然科学版), 2017, 57(1): 50-54.
[4] 马金鑫, 张涛, 李舟军, 张江霄. Fuzzing过程中的若干优化方法[J]. 清华大学学报(自然科学版), 2016, 56(5): 478-483.
[5] 崔宝江, 王福维, 郭涛, 柳本金. 基于污点信息的函数内存模糊测试技术研究[J]. 清华大学学报(自然科学版), 2016, 56(1): 7-13.
[6] 梁洪亮, 阳晓宇, 董钰, 张普含, 刘书昌. 并行化智能模糊测试[J]. 清华大学学报(自然科学版), 2014, 54(1): 14-19.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 《清华大学学报(自然科学版)》编辑部
本系统由北京玛格泰克科技发展有限公司设计开发 技术支持:support@magtech.com.cn