文化大學機構典藏 CCUR:Item 987654321/22015
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 46867/50733 (92%)
Visitors : 11890320      Online Users : 787
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: https://irlib.pccu.edu.tw/handle/987654321/22015


    Title: 無線網路駭客入侵訊標偵測與資訊安全防護
    Authors: 蔡昌隆
    周立平
    洪政賢
    Contributors: 工學院
    Keywords: 資訊安全
    駭客
    無線網路
    反偵錄
    Information security
    Hacker
    Wireless networking
    Anti-sniffing
    Date: 2008-06-01
    Issue Date: 2012-04-11 13:50:39 (UTC+8)
    Abstract: 具備硬碟記憶功能的無線基地台已成無線網路通訊的儲存伺服器,是故不需啟動電腦即可提供外部檔案分享的相關服務,因此網路頻寬分享已廣泛應用,然藉由網路分享器、路由器、交換器與伺服器等分享有線或無線的網路資源,雖非常方便並可節省成本,國際更據此更形成諸多頻寬分享社群;惟個人或企業善意的提供分享網路資源,在不知不覺的狀況下,已將自身的網路系統或相關資源置於被攻擊的危險境況。由於網路駭客攻擊手法日益翻新,如何兼顧資源分享並同時確保資訊安全,相關之防範與偵測作為確屬必要。本篇論文特針對無線網路通訊環境下,駭客所慣常使用的手法進行模擬分析,就駭客攻擊的訊號來源進行追蹤和標定,有效掌握駭客入侵和攻擊的行為模式,並研發可反制網路資訊側錄及建立網路安全自動化驗證的機制,以即時彌補網路安全的缺失和漏洞,俾能降低受攻擊的風險,減少資安的損失。

    Sharing network bandwidth is one of the consensus advocating programs to save resources and has significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprise's confidential information. Because most of the versatile digital networking equipments can share the outside file service without starting the computer, thus personal resources will be utilized without any notice or advanced permission. Moreover, the innovation of network phishing, intelligent criminal and cracker's attacking has dramatically induced and increased the occurrence of information security, social security, national security, and international networking community security problems day by day. Those attacking have forced the supervisors and administrators of the information management of Government, enterprises, and research institutes to face the unpredicted information security problem and try to rescue from the disaster by fixing the leakage of information security. Thus, beware of personal networking behavior and increase the robustness of firewall or anti-virus system is insufficient passive validating methods. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, positive defense and protection strategy such as the development of network's security checking criteria, anti-sniffing software and encrypting software is a must. Thus, the shortcoming and leakage of information security issue can be remedied and rescued in time to reduce the risk of being attacking and decrease the cost of loss.
    Relation: 華岡工程學報 22期 p.143 -151
    Appears in Collections:[College of Engineering] Chinese Culture University Hwa Kang Journal of Engineering

    Files in This Item:

    File Description SizeFormat
    index.html0KbHTML193View/Open


    All items in CCUR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback