Wireless network Risk Assessment Model and Application

Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. In this paper we had analyzed the risks mechanism of WLAN for network resources, and desi...

Full description

Saved in:
Bibliographic Details
Main Author: Tang, JianGang (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2014-06-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01956 am a22002653u 4500
001 ijeecs3551_1816
042 |a dc 
100 1 0 |a Tang, JianGang  |e author 
100 1 0 |e contributor 
245 0 0 |a Wireless network Risk Assessment Model and Application 
260 |b Institute of Advanced Engineering and Science,   |c 2014-06-01. 
520 |a Wireless network makes up the wired network shortcomings. With the popularity of the WiFi terminal, the security threats are constantly upgrading, and the security issues have been plaguing the legitimate user. In this paper we had analyzed the risks mechanism of WLAN for network resources, and designed an assessment model of security risk. When the incidents of network security which caused for vulnerability factors had been occurred, the model can be used to assess the consequences and impact on WLAN. The model achieves the network security early warning and control by scientific measurement and evaluation of the WLAN security risks. Wireless network security is not only with authentication, encryption, integrity testing and other technology-related, but also need intrusion detection systems, firewalls and other technology cooperation, so it's a multi-layered problem. DOI: http://dx.doi.org/10.11591/telkomnika.v12i6.5446  
540 |a Copyright (c) 2014 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 12, No 6: June 2014; 4639-4647 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v12.i6 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3551/1816 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/3551/1816  |z Get fulltext