메뉴 건너뛰기




Volumn , Issue , 2007, Pages 323-338

Proximity breeds danger: Emerging threats in metro-area wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; COMPUTER CRIME;

EID: 84947612643     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (55)
  • 3
    • 85077698784 scopus 로고    scopus 로고
    • Honeynet project. http://www.honeynet.org
    • Honeynet project. http://www.honeynet.org.
  • 5
    • 85077684772 scopus 로고    scopus 로고
    • OpenWRT Project. http://openwrt.org
    • OpenWRT Project. http://openwrt.org/.
  • 6
    • 78650554812 scopus 로고    scopus 로고
    • Securityfocus.com, vulnerabilities. http://www.securityfocus.com/vulnerabilities.
    • Vulnerabilities
  • 7
    • 85077686701 scopus 로고    scopus 로고
    • UMich wireless usage. http://www.itcom.itd.umich.edu/wireless/stats/yr2006/02/campus.html.
    • UMich Wireless Usage
  • 8
    • 85077693438 scopus 로고    scopus 로고
    • WEP: Dead Again. http://www.securityfocus.com/infocus/1814#aircrack.
    • WEP: Dead Again
  • 11
    • 85077674517 scopus 로고    scopus 로고
    • A year of bugs. http://bcheck.scanit.be/bcheck/page.php?name=STATS2004&page=3.
    • A Year of Bugs
  • 13
    • 85077687260 scopus 로고    scopus 로고
    • Dec
    • WMF exploitation. http://www.f-secure.com/weblog/archives/archive-122005.html, Dec. 2005.
    • (2005) WMF Exploitation
  • 22
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • Rome, Italy, July
    • N. Borisov, I. Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11. In Proceedings of ACM Mobicom, Rome, Italy, July 2001.
    • (2001) Proceedings of ACM Mobicom
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 27
    • 85077673415 scopus 로고    scopus 로고
    • June
    • F-Secure. Cabir worm description. http://www.f-secure.com/v-descs/cabir.shtml, June 2004.
    • (2004) Cabir Worm Description
  • 29
    • 85077719851 scopus 로고    scopus 로고
    • Feb
    • F-Secure. Inqtana.A worm information. http://www.f-secure.com/v-descs/inqtana_a.shtml, Feb. 2006.
    • (2006) Inqtana.A Worm Information
  • 32
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 10(3):315–325, 2005.
    • (2005) Mob. Netw. Appl. , vol.10 , Issue.3 , pp. 315-325
    • Gruteser, M.1    Grunwald, D.2
  • 35
    • 34247389249 scopus 로고    scopus 로고
    • Framework for location privacy in wireless networks
    • Hu and Wang. Framework for location privacy in wireless networks. In ACM SIGCOMM Asia Workshop, 2005.
    • (2005) ACM SIGCOMM Asia Workshop
    • Hu1    Wang2
  • 38
    • 85077708389 scopus 로고    scopus 로고
    • weblog. Feb. 2006
    • B. Krebs. 2005 patch times for Firefox and Internet Explorer. Washington Post weblog. http://blog.washingtonpost.com/securityfix/2006/ 02/2005_patch_times_for%_firefox_a.html, Feb. 2006.
    • (2005) Patch Times for Firefox and Internet Explorer
    • Krebs, B.1
  • 39
    • 84903658497 scopus 로고    scopus 로고
    • Internet explorer unsafe for 284 days in 2006
    • Jan
    • B. Krebs. Internet Explorer unsafe for 284 days in 2006. Washington Post weblog. http://blog.washingtonpost.com/securityfix/2007/01/internet_explorer_ un%safe_for_2.html, Jan. 2007.
    • (2007) Washington Post Weblog
    • Krebs, B.1
  • 40
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • April
    • N. Leavitt. Mobile Phones: The Next Frontier for Hackers? IEEE Computer, 38(4), April 2005.
    • (2005) IEEE Computer , vol.38 , Issue.4
    • Leavitt, N.1
  • 42
    • 85077724107 scopus 로고    scopus 로고
    • June Accessed on September 15th, 2006
    • R. McMillan. Researchers hack wi-fi driver to breach laptop. InfoWorld. http://www.infoworld.com/article/06/06/21/79536_HNwifibreach_1.html, June 2006. Accessed on September 15th, 2006.
    • (2006) Researchers Hack Wi-Fi Driver to Breach Laptop
    • McMillan, R.1
  • 46
    • 85090433665 scopus 로고    scopus 로고
    • SNORT: Lightweight intrusion detection for networks
    • November software
    • M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA, November 1999. (software available from http://www.snort.org/).
    • (1999) Proceedings of USENIX LISA
    • Roesch, M.1
  • 48
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • July/August
    • C. Shannon and D. Moore. The Spread of the Witty Worm. IEEE Security & Privacy, 2(4):46–50, July/August 2004.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.