English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 46867/50733 (92%)
造訪人次 : 11887548      線上人數 : 750
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    主頁登入上傳說明關於CCUR管理 到手機版


    請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/22015


    題名: 無線網路駭客入侵訊標偵測與資訊安全防護
    作者: 蔡昌隆
    周立平
    洪政賢
    貢獻者: 工學院
    關鍵詞: 資訊安全
    駭客
    無線網路
    反偵錄
    Information security
    Hacker
    Wireless networking
    Anti-sniffing
    日期: 2008-06-01
    上傳時間: 2012-04-11 13:50:39 (UTC+8)
    摘要: 具備硬碟記憶功能的無線基地台已成無線網路通訊的儲存伺服器,是故不需啟動電腦即可提供外部檔案分享的相關服務,因此網路頻寬分享已廣泛應用,然藉由網路分享器、路由器、交換器與伺服器等分享有線或無線的網路資源,雖非常方便並可節省成本,國際更據此更形成諸多頻寬分享社群;惟個人或企業善意的提供分享網路資源,在不知不覺的狀況下,已將自身的網路系統或相關資源置於被攻擊的危險境況。由於網路駭客攻擊手法日益翻新,如何兼顧資源分享並同時確保資訊安全,相關之防範與偵測作為確屬必要。本篇論文特針對無線網路通訊環境下,駭客所慣常使用的手法進行模擬分析,就駭客攻擊的訊號來源進行追蹤和標定,有效掌握駭客入侵和攻擊的行為模式,並研發可反制網路資訊側錄及建立網路安全自動化驗證的機制,以即時彌補網路安全的缺失和漏洞,俾能降低受攻擊的風險,減少資安的損失。

    Sharing network bandwidth is one of the consensus advocating programs to save resources and has significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprise's confidential information. Because most of the versatile digital networking equipments can share the outside file service without starting the computer, thus personal resources will be utilized without any notice or advanced permission. Moreover, the innovation of network phishing, intelligent criminal and cracker's attacking has dramatically induced and increased the occurrence of information security, social security, national security, and international networking community security problems day by day. Those attacking have forced the supervisors and administrators of the information management of Government, enterprises, and research institutes to face the unpredicted information security problem and try to rescue from the disaster by fixing the leakage of information security. Thus, beware of personal networking behavior and increase the robustness of firewall or anti-virus system is insufficient passive validating methods. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, positive defense and protection strategy such as the development of network's security checking criteria, anti-sniffing software and encrypting software is a must. Thus, the shortcoming and leakage of information security issue can be remedied and rescued in time to reduce the risk of being attacking and decrease the cost of loss.
    關聯: 華岡工程學報 22期 p.143 -151
    顯示於類別:[工學院] 學報-華岡工程學報

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML190檢視/開啟


    在CCUR中所有的資料項目都受到原著作權保護.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋