透過您的圖書館登入
IP:3.128.199.162
  • 期刊
  • OpenAccess

無線網路駭客入侵訊標偵測與資訊安全防護

Wireless Networking Hacker's Attacking and Beacon Tracking and Information Protection

摘要


具備硬碟記憶功能的無線基地台已成無線網路通訊的儲存伺服器,是故不需啟動電腦即可提供外部檔案分享的相關服務,因此網路頻寬分享已廣泛應用,然藉由網路分享器、路由器、交換器與伺服器等分享有線或無線的網路資源,雖非常方便並可節省成本,國際更據此更形成諸多頻寬分享社群;惟個人或企業善意的提供分享網路資源,在不知不覺的狀況下,已將自身的網路系統或相關資源置於被攻擊的危險境況。由於網路駭客攻擊手法日益翻新,如何兼顧資源分享並同時確保資訊安全,相關之防範與偵測作為確屬必要。本篇論文特針對無線網路通訊環境下,駭客所慣常使用的手法進行模擬分析,就駭客攻擊的訊號來源進行追蹤和標定,有效掌握駭客入侵和攻擊的行為模式,並研發可反制網路資訊側錄及建立網路安全自動化驗證的機制,以即時彌補網路安全的缺失和漏洞,俾能降低受攻擊的風險,減少資安的損失。

關鍵字

資訊安全 駭客 無線網路 反偵錄

並列摘要


Sharing network bandwidth is one of the consensus advocating programs to save resources and has significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprise's confidential information. Because most of the versatile digital networking equipments can share the outside file service without starting the computer, thus personal resources will be utilized without any notice or advanced permission. Moreover, the innovation of network phishing, intelligent criminal and cracker's attacking has dramatically induced and increased the occurrence of information security, social security, national security, and international networking community security problems day by day. Those attacking have forced the supervisors and administrators of the information management of Government, enterprises, and research institutes to face the unpredicted information security problem and try to rescue from the disaster by fixing the leakage of information security. Thus, beware of personal networking behavior and increase the robustness of firewall or anti-virus system is insufficient passive validating methods. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, positive defense and protection strategy such as the development of network's security checking criteria, anti-sniffing software and encrypting software is a must. Thus, the shortcoming and leakage of information security issue can be remedied and rescued in time to reduce the risk of being attacking and decrease the cost of loss.

延伸閱讀