You are on page 1of 8

HOC VIN KY THUT MT MA

KHOA CNG NGH THNG TIN

Bao cao thc t p tt nghip


NGHIN CU MT S PHNG THC TN CNG MNG
KHNG DY V NH GI AN TON CHO MNG KHNG
DY

Sinh vin: Can b hng dn:


L Minh Dng ThS. Phm Minh Thun
Lp: AT9C
Gii thi u tai
Muc tiu:
Nghin cu v cac im yu mng khng dy.
Cac phng thc tn cng mng khng dy ch yu.
Phng phap kim th an toan cho mng khng dy.
Th nghim kim th an toan cho mng khng dy.

10/05/17 2
Gii thi u tai
Ni dung d kin
Chng 1. Tng quan v mng khng dy
Chng 2. Mt s phng phap tn cng mng khng dy
Chng 3. Kim th an toan cho mng khng dy
Chng 4. Th nghim kim th an toan cho mng khng
dy.

10/05/17 3
Ni dung t c
Chng 1. Tng quan v mng khng dy
Khai nim mng khng dy
Cac chun mng khng dy
Cac phng thc bo mt trong mng khng dy
Thc trng mt an ninh an toan ca mng khng dy

10/05/17 4
Ni dung t c
CHNG 2. MT S PHNG PHP TN CNG MNG
KHNG DY
Cac im yu mng khng dy
Cac phng phap tn cng mng khng dy ph bin:
Tn cng bi ng- Nghe tr m
(Passive Attack hay Eavesdropping)
Tn cng ch ng Active Attack (kt ni, thm d va cu hnh mng)
Tn cng kiu chen ep (Jamming Attack)
Tn cng kiu thu hut (Man-in-the-middle Attack)
Tn cng gi mo (ROGUE ACCESS POINT)
De-authentication Flood Attack(tn cng yu cu xac thc li )
Tn cng da trn s cm nhn sng mang lp vt l
Tn cng ngt kt ni (Denial of Services Attack )

10/05/17 5
Kh khn gp phi
Tai liu nghin cu cn hn ch
Kh nng dich cha tt
Hn ch v thi gian

10/05/17 6
Kt lun & Hng phat trin
ng gp chnh ca tai
Cac c s l thuyt lin quan n muc tiu tai.
Gii thiu c phng phap kim th an toan cho mng
khng dy.
Hng phat trin
Tip tuc hoan thin tai trong thi gian ti.

10/05/17 7
Tai liu tham kho
Ti liu sch
[1] Vivek Ramachandran, Cameron Buchanan, Kali Linux Wireless Penetration Testing
Beginners Guide
[2] V Quc Oai, Thit K Mng Khng Dy, TP. HCM, Vit Nam: B Giao Duc va ao
To, 2013.
Ti liu Internet:
[3] Lm Th Nhn , Tng Quan V Mng Khng Dy:
www.vnpro.org/forum/forum/ccent/icnd-1-basic-wireless-lan-config/12084-tng-quan-v-
mng-khng-dy.
[4] Nguyn Duy Mn , Tm Hiu V An Ninh Mng Khng Dy:
https://prezi.com/fkao0jbjse5f/an-ninh-mang-khong-day/
[5] Wireless Security Wikipedia:
https://en.wikipedia.org/wiki/Wireless_security
[6] ng Phm Phuc Duy, Nguyn Hoang Quc Phong, Cc kiu tn cng trn mng , Lun
vn tt nghip c nhn CNTT, H Ngoi Ng Tin Hc TP. HCM, 2010.

10/05/17 8

You might also like