首页 | 本学科首页   官方微博 | 高级检索  
     

基于TOPSIS的无线嗅探安全评估模型
引用本文:俞淑婷,金志刚,刘永磊.基于TOPSIS的无线嗅探安全评估模型[J].计算机工程,2013,39(3):157-161.
作者姓名:俞淑婷  金志刚  刘永磊
作者单位:1. 天津大学电子信息工程学院,天津,300072
2. 天津城市建设学院电子与信息工程系,天津,300384
基金项目:国家自然科学基金资助项目(61162003);天津大学自主创新基金资助项目
摘    要:为分析802.11无线局域网(WLAN)防御嗅探攻击的安全风险,提出一种基于TOPSIS算法的评估模型。根据嗅探攻击的特点,结合层次分析法,建立攻击可能性和攻击成功性评估指标体系,在此基础上以网络统计及专家经验数据为依据,构造判断矩阵,计算评估指标权重,并利用 TOPSIS 算法搭建风险值评估系统。建模分析结果表明,评估结果可以呈现WLAN所处的安全等级和导致风险的薄弱环节,为加强安全措施提供指导。

关 键 词:无线局域网  安全评估  嗅探攻击  风险分析  TOPSIS算法  层次分析法
收稿时间:2012-03-27

TOPSIS-based Security Assessment Model for Wireless Sniffer
YU Shu-ting , JIN Zhi-gang , LIU Yong-lei.TOPSIS-based Security Assessment Model for Wireless Sniffer[J].Computer Engineering,2013,39(3):157-161.
Authors:YU Shu-ting  JIN Zhi-gang  LIU Yong-lei
Affiliation:(1. School of Electronic Information Engineering, Tianjin University, Tianjin 300072, China; 2. Department of Electronic and Information Engineering, Tianjin Institute of Urban Construction, Tianjin 300384, China)
Abstract:In order to analyze the security risk of 802.11 Wireless Local Area Network(WLAN) on defensing sniffer attack, this paper presents a security assessment model based on Technique for Order Preference by Similarity to Ideal Solution(TOPSIS). By the characters of the wireless sniffer, combining with the Analytical Hierarchy Process, two evaluation systems which are the certainty of chance and the possibility of successfully attacking are established. According to the network statistics and expert experience data, judgment matrix is built up to calculate the weight of each assessment index. TOPSIS method is used to establish the risk assessment system. Modeling analysis result shows the rank of WLAN’s security status and the weak link that will cause risk, which makes it easy to strengthen security measures and improve the safety performance.
Keywords:Wireless Local Area Network(WLAN)  security assessment  sniffer attack  risk analysis  Technique for Order Preference by Similarity to Ideal Solution(TOPSIS) algorithm  Analytic Hierarchy Process(AHP)
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号