文化大學機構典藏 CCUR:Item 987654321/22015
English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 46867/50733 (92%)
造访人次 : 11889714      在线人数 : 505
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻
    主页登入上传说明关于CCUR管理 到手机版


    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: https://irlib.pccu.edu.tw/handle/987654321/22015


    题名: 無線網路駭客入侵訊標偵測與資訊安全防護
    作者: 蔡昌隆
    周立平
    洪政賢
    贡献者: 工學院
    关键词: 資訊安全
    駭客
    無線網路
    反偵錄
    Information security
    Hacker
    Wireless networking
    Anti-sniffing
    日期: 2008-06-01
    上传时间: 2012-04-11 13:50:39 (UTC+8)
    摘要: 具備硬碟記憶功能的無線基地台已成無線網路通訊的儲存伺服器,是故不需啟動電腦即可提供外部檔案分享的相關服務,因此網路頻寬分享已廣泛應用,然藉由網路分享器、路由器、交換器與伺服器等分享有線或無線的網路資源,雖非常方便並可節省成本,國際更據此更形成諸多頻寬分享社群;惟個人或企業善意的提供分享網路資源,在不知不覺的狀況下,已將自身的網路系統或相關資源置於被攻擊的危險境況。由於網路駭客攻擊手法日益翻新,如何兼顧資源分享並同時確保資訊安全,相關之防範與偵測作為確屬必要。本篇論文特針對無線網路通訊環境下,駭客所慣常使用的手法進行模擬分析,就駭客攻擊的訊號來源進行追蹤和標定,有效掌握駭客入侵和攻擊的行為模式,並研發可反制網路資訊側錄及建立網路安全自動化驗證的機制,以即時彌補網路安全的缺失和漏洞,俾能降低受攻擊的風險,減少資安的損失。

    Sharing network bandwidth is one of the consensus advocating programs to save resources and has significantly increased and grouped into many networking communities. However, those good intentions of sharing the network bandwidth might attract the attention of intelligentsia and hackers to access personal or enterprise's confidential information. Because most of the versatile digital networking equipments can share the outside file service without starting the computer, thus personal resources will be utilized without any notice or advanced permission. Moreover, the innovation of network phishing, intelligent criminal and cracker's attacking has dramatically induced and increased the occurrence of information security, social security, national security, and international networking community security problems day by day. Those attacking have forced the supervisors and administrators of the information management of Government, enterprises, and research institutes to face the unpredicted information security problem and try to rescue from the disaster by fixing the leakage of information security. Thus, beware of personal networking behavior and increase the robustness of firewall or anti-virus system is insufficient passive validating methods. In order to provide more convenient utilization of networking and achieve the goals of resources sharing and protecting private information simultaneously, positive defense and protection strategy such as the development of network's security checking criteria, anti-sniffing software and encrypting software is a must. Thus, the shortcoming and leakage of information security issue can be remedied and rescued in time to reduce the risk of being attacking and decrease the cost of loss.
    關聯: 華岡工程學報 22期 p.143 -151
    显示于类别:[工學院] 學報-華岡工程學報

    文件中的档案:

    档案 描述 大小格式浏览次数
    index.html0KbHTML190检视/开启


    在CCUR中所有的数据项都受到原著作权保护.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回馈