科技报告详细信息
Intrusion detection and monitoring for wireless networks.
Thomas, Eric D. ; Van Randwyk, Jamie A. ; Lee, Erik J. ; Stephano, Amanda (Indiana University) ; Tabriz, Parisa (University of Illinois at Urbana-Champaign) ; Pelon, Kristen (Cedarville University) ; McCoy, Damon (University of Colorado, Boulder) ; Lodato, Mark (Lafayette College) ; Hemingway, Franklin (University of New Mexico) ; Custer, Ryan P. ; Averin, Dimitry (Polytechnic University) ; Franklin, Jason (Carnegie Mellon University) ; Kilman, Dominique Marie
Sandia National Laboratories
关键词: Monitoring;    99 General And Miscellaneous//Mathematics, Computing, And Information Science;    Vulnerability;    Computer Networks;    Communications Internet (Computer Network);   
DOI  :  10.2172/876529
RP-ID  :  SAND2005-7408
RP-ID  :  AC04-94AL85000
RP-ID  :  876529
美国|英语
来源: UNT Digital Library
PDF
【 摘 要 】

Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.

【 预 览 】
附件列表
Files Size Format View
876529.pdf 2431KB PDF download
  文献评价指标  
  下载次数:112次 浏览次数:105次