期刊文献+

基于状态机的802.1X协议攻击检测方法 被引量:4

Detection Methods for 802.1X Protocol Attacks Using State Machine
在线阅读 下载PDF
导出
摘要 针对802.1X协议存在一定漏洞且易受重放、拒绝服务等攻击,结合802.1X协议的认证过程,抽象出802.1X协议认证的状态转移过程,同时针对802.1X协议的功能性攻击,构造出一套攻击状态转移机制:分析802.11报文和基于局域网的扩展认证协议(EAPOL)/扩展认证协议(EAP)报文的结构;剔除出重传的报文,逐个字段解析出关键字并存入链表中;将根据EAPOL/EAP报文格式取得检测所需的EAP报文存入缓存.据此,设计出基于状态机的802.1X的攻击检测方法.实验结果表明,在实际组网环境下的重放/DoS等802.1X功能性攻击能够得到准确的检测,并具有有效、统一的检测结果. There are some loopholes in 802.1X protocol such as replay attacks, DoS (Denial of Service) attacks and so on. The paper presents an state transition process for certification of 802.1X, and designs an attack state transfer mechanism for functional attacks. The architecture of 802. 11 frames, EAPOL frames and EAP frames are analyzed. The replay frames are deleted and keywords are abstracted and saved from the list of remaining frames one by one. Then the EAP frames which are required for detection are saved in the cache. The security detection method of 802. 1X is designed based on the state transition mechanism. Experimental results show that functional attacks of 802.1X such as replay/DoS attacks can be detected accurately in real network environments, and the detection is effective and consistent.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2010年第4期52-56,共5页 Journal of Xi'an Jiaotong University
基金 国家自然科学基金资助项目(60872009 60602016) 国家高技术发展计划资助项目(2007AA01Z428 2009AA01Z148) 安徽省自然科学研究计划重大项目(ZD2008005-2 ZD00904 JK2009A013 JK2009A025)
关键词 协议攻击 状态转移 检测方法 protocol attack state transition detection method
  • 相关文献

参考文献10

  • 1BRAWN S K,KOA R M,CAYE K.Secure in an insecure world:802.1X secure wireless computer connectivity for students,faculty,and staff to the camp-us network[C] // Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services.New York,USA,ACM,2004:273-277.
  • 2CROW B P,WIDJAJA I,KIM J G,et al.IEEE 802.11 wireless local area networks[J].IEEE Communications Magazine,1997,35(9).116-126.
  • 3JEFFREET,CONGDON P,SALA D,et al.P802.1X/D11-2001 IEEE standard for local and metropolitan area networks:standard for portbase network access control[S].Piscataway,NJ,USA:IEEE,2001.
  • 4ABOBA B,BLUNK L,VOLLBRECHT J,et al.RFC 3748-2004 Extensible authentication protocol (EAP)[S].Piscataway,NJ,USA:IETF,2004.
  • 5MISHRA A,ARBAUGH W A.An initial security analysis of the IEEE 802.1X standard[R].Maryland,USA; University of Maryland.Department of Computer Science,2002.
  • 6HWANG H,GYEOK J,SOHN K,et al.A study on M1TM (man in the middle) vulnerability in wireless network using 802.1X and EAP[C]//Proceedings of the 2008 International Conference on Information Sci-ence and Security.Los Alamitos,CA,USA:IEEE Computer Society,2008:164-170.
  • 7MCFALL R,DERSHEM H L.Finite state machine simulation in an introductory lab[C]//25th SIGCSE Technical Symposium on Computer Science Education.New York:USA:ACM,1994:126-130.
  • 8Microsoft Corporation.Protected extensible authentication protocol (PEAP) specifi-cation[EB/OL].[2009-07-27].http://msdn.microsoft.com/en-us/li-brary/cc238354(PROT.13).aspx.
  • 9DING P,HOLLIDAY J,CELIK A.Improving the security of wireless LANs by managing 802.1X disas-sociation[C] // Proceedings of the IEEE Consumer Communications and Networking Conference.Piscataway,NJ,USA:IEEE,2004:53-58.
  • 10PACK S,CHOI Y H.Pre-authenticated fast handoff in a public wireless LAN based on IEEE 802.1X model[C]//Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications.De-venter,Netherlands:Kluwer,2002:175-182.

同被引文献21

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部