Detector of the WLAN security and management distributed system

Haifeng Wang, Minglei Shu, Jialiang Lu, Jing Chen, Guodong Li, Chunjie Li

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.

Original languageEnglish (US)
Pages (from-to)1939-1944
Number of pages6
JournalYi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument
Volume29
Issue number9
StatePublished - Sep 1 2008

Fingerprint

Wireless local area networks (WLAN)
attack
Detectors
detectors
local area networks
Local area networks
conversation
vulnerability
Intrusion detection
central processing units
fragmentation
hardware
Wireless networks
Computer systems
Servers
computer programs
Hardware
Testing

All Science Journal Classification (ASJC) codes

  • Instrumentation

Cite this

Wang, Haifeng ; Shu, Minglei ; Lu, Jialiang ; Chen, Jing ; Li, Guodong ; Li, Chunjie. / Detector of the WLAN security and management distributed system. In: Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument. 2008 ; Vol. 29, No. 9. pp. 1939-1944.
@article{e056babd9e7a4fd98da0db28b7e88d7a,
title = "Detector of the WLAN security and management distributed system",
abstract = "Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.",
author = "Haifeng Wang and Minglei Shu and Jialiang Lu and Jing Chen and Guodong Li and Chunjie Li",
year = "2008",
month = "9",
day = "1",
language = "English (US)",
volume = "29",
pages = "1939--1944",
journal = "Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument",
issn = "0254-3087",
publisher = "Science Press",
number = "9",

}

Detector of the WLAN security and management distributed system. / Wang, Haifeng; Shu, Minglei; Lu, Jialiang; Chen, Jing; Li, Guodong; Li, Chunjie.

In: Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, Vol. 29, No. 9, 01.09.2008, p. 1939-1944.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Detector of the WLAN security and management distributed system

AU - Wang, Haifeng

AU - Shu, Minglei

AU - Lu, Jialiang

AU - Chen, Jing

AU - Li, Guodong

AU - Li, Chunjie

PY - 2008/9/1

Y1 - 2008/9/1

N2 - Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.

AB - Aiming at the particularity of wireless LAN attacks, the WLAN Security and Management Distributed System with detectors has been widely used in wireless network. The detector affords the functions including WLAN access, intrusion detections, attack orientation and attack interdiction by collecting and analyzing every wireless packet, device in net, and conversation for security and performance problems. This detector hardware was based on Intel PXA255 embedded processor and the software was adopted snort-wireless in Linux. It combines the advantages of long distance and high velocity of wireless LAN access and the ability to detect and defend WLAN attacks and communicate with servers. Testing results demonstrate that the detector can afford the WLAN access function and also offer active, full-time protection against tens of other wireless threats including wireless vulnerabilities, Denial-of Service attacks, MAC spoofing, fragmentation attacks, evil twins, unapproved connections and scores of wireless hacking.

UR - http://www.scopus.com/inward/record.url?scp=54049116703&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=54049116703&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:54049116703

VL - 29

SP - 1939

EP - 1944

JO - Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument

JF - Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument

SN - 0254-3087

IS - 9

ER -