메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1894-1902

A hybrid rogue access point protection framework for commodity Wi-Fi networks

Author keywords

Commodity Wi Fi networks; Intrusion detection; Rogue access point detection; Wireless security

Indexed keywords

COST EFFECTIVENESS; ELECTRIC BREAKDOWN; INTERNET; RISK ASSESSMENT; STANDARDS;

EID: 51349162676     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFOCOM.2007.178     Document Type: Conference Paper
Times cited : (70)

References (38)
  • 2
    • 51349102127 scopus 로고    scopus 로고
    • Online, Available
    • "Gartner advises on security." [Online]. Available: http://www.gartner.com/5_about/press_releases/2001/pr20010809b.html
    • Gartner advises on security
  • 4
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • N. Borisov, I. Goldberg, and D. Wagner, "Intercepting mobile communications: the insecurity of 802.11," in MobiCom '01, 2001, pp. 180-189.
    • (2001) MobiCom '01 , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 5
    • 0037766154 scopus 로고    scopus 로고
    • Security flaws in 802.11 data link protocols
    • N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, "Security flaws in 802.11 data link protocols," Commun. ACM, vol. 46, no. 5, pp. 35-39, 2003.
    • (2003) Commun. ACM , vol.46 , Issue.5 , pp. 35-39
    • Cam-Winget, N.1    Housley, R.2    Wagner, D.3    Walker, J.4
  • 9
    • 11244291937 scopus 로고    scopus 로고
    • Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
    • A. Adya, P. Bahl, R. Chandra, and L. Qiu, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks," in Mobi-Com '04, 2004, pp. 30-44.
    • (2004) Mobi-Com '04 , pp. 30-44
    • Adya, A.1    Bahl, P.2    Chandra, R.3    Qiu, L.4
  • 11
    • 18144401989 scopus 로고    scopus 로고
    • Rogue access point detection using temporal traffic characteristics
    • R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in GLOBECOM, 2004.
    • (2004) GLOBECOM
    • Beyah, R.1    Kangude, S.2    Yu, G.3    Strickland, B.4    Copeland, J.5
  • 12
    • 47949122729 scopus 로고    scopus 로고
    • Rogue access point detection by analyzing network traffic characteristics
    • Orlando, Florida, October
    • S. Shetty, M. Song, and L. Ma, "Rogue access point detection by analyzing network traffic characteristics," in MILCOM, Orlando, Florida, October 2007.
    • (2007) MILCOM
    • Shetty, S.1    Song, M.2    Ma, L.3
  • 17
    • 39349105309 scopus 로고    scopus 로고
    • Passive listening and intrusion management in commodity wi-fi networks
    • L. Ma, A. Y. Teymorian, and X. Cheng, "Passive listening and intrusion management in commodity wi-fi networks," in GLOBECOM, 2007.
    • (2007) GLOBECOM
    • Ma, L.1    Teymorian, A.Y.2    Cheng, X.3
  • 18
    • 51349104860 scopus 로고    scopus 로고
    • P. Mateti, Hacking techniques in wireless networks. [On-line]. Available: http://www.cs.wright.edu/~pmateti/InternetSecurity/ Lectures/WirelessHacks/Mateti-WirelessHacks.htm
    • P. Mateti, "Hacking techniques in wireless networks." [On-line]. Available: http://www.cs.wright.edu/~pmateti/InternetSecurity/ Lectures/WirelessHacks/Mateti-WirelessHacks.htm
  • 19
    • 51349144472 scopus 로고    scopus 로고
    • ARP request replay attack, Online, Available
    • "ARP request replay attack." [Online]. Available: http://www.aircrack-ng.org/doku.php?id=arp-request_reinjection
  • 20
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. T. King, "Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities." in NDSS, 2006.
    • (2006) NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4    Verbowski, C.5    Chen, S.6    King, S.T.7
  • 21
    • 51349163004 scopus 로고    scopus 로고
    • Honeyclient project, Online, Available
    • "Honeyclient project." [Online]. Available: http://www.honeyclient.org/trac
  • 24
    • 39349099129 scopus 로고    scopus 로고
    • pOf: A versatile passive os fingerprinting tool
    • Online, Available
    • "pOf: a versatile passive os fingerprinting tool." [Online]. Available: http://lcamtuf.coredump.cx/p0f.shtml
  • 26
    • 0031153399 scopus 로고    scopus 로고
    • WaveLAN-II: A high-performance wireless lan for the unlicensed band
    • A. Kamerman and L. Monteban, "WaveLAN-II: A high-performance wireless lan for the unlicensed band," Bell Labs Technical Journal, 1997.
    • (1997) Bell Labs Technical Journal
    • Kamerman, A.1    Monteban, L.2
  • 27
    • 29244434632 scopus 로고    scopus 로고
    • Bit-rate selection in wireless networks,
    • Master's thesis, Massachusetts Institute of Technology
    • J. Bicket, "Bit-rate selection in wireless networks," Master's thesis, Massachusetts Institute of Technology, 2005.
    • (2005)
    • Bicket, J.1
  • 29
    • 37749047975 scopus 로고    scopus 로고
    • Robust location distinction using temporal link signatures
    • N. Patwari and S. K. Kasera, "Robust location distinction using temporal link signatures," in MobiCom '07, 2007, pp. 111-122.
    • (2007) MobiCom '07 , pp. 111-122
    • Patwari, N.1    Kasera, S.K.2
  • 34
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • New York, NY, USA: ACM
    • A. W. Moore and D. Zuev, "Internet traffic classification using bayesian analysis techniques," in SIGMETRICS '05. New York, NY, USA: ACM, 2005, pp. 50-60.
    • (2005) SIGMETRICS '05 , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 38
    • 51349146962 scopus 로고    scopus 로고
    • Online, Available
    • "Advanced 802.11 attack: Black hat 2002." [Online]. Available: http://www.blackhat.com/presentations/bh-usa-02/baird-lynn/bh-us-02-lynn-802. 11attack.ppt
    • (2002) Advanced 802.11 attack: Black hat


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.