메뉴 건너뛰기




Volumn 24, Issue 1, 2017, Pages 14-26

The Performance Analysis of Honeypot Based Intrusion Detection System for Wireless Network

Author keywords

Honeypot; Intrusion detection system; Network attacks; Rogue access point; Wi Fi protected access; Wired equivalent privacy

Indexed keywords

COMPUTER CRIME; ERRORS; IMAGE RESOLUTION; INTRUSION DETECTION; MERCURY (METAL); WI-FI; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS NETWORKS;

EID: 85008703761     PISSN: 10689605     EISSN: 15728129     Source Type: Journal    
DOI: 10.1007/s10776-016-0330-3     Document Type: Article
Times cited : (17)

References (25)
  • 1
    • 84949223752 scopus 로고    scopus 로고
    • S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography, 8th Annual International Workshop, SAC, Toronto, Ontario, Canada (Springer-Verlag Berlin Heidelberg 2001), pp. 1–24.
    • (2001) Ontario, Canada (Springer-Verlag Berlin Heidelberg , pp. 1-24
  • 2
    • 85177214291 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11. In the proceedings of the Seventh Annual International Conference on Mobile Computing And Networking
    • N. Borisov, I. Goldberg and D. Wagner, Intercepting mobile communications: The insecurity of 802.11. In the proceedings of the Seventh Annual International Conference on Mobile Computing And Networking, ACM New York USA, pp. 16–21 (2001).
    • (2001) ACM New York USA , pp. 16-21
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 4
    • 38549101578 scopus 로고    scopus 로고
    • Breaking 104 bit WEP in less than 60 seconds. In the Proceedings of the 8th International Conference on Information Security Applications
    • E. Tews, R. P. Weinmann and A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds. In the Proceedings of the 8th International Conference on Information Security Applications, Springer Verlag Berlin Heidelberg, pp. 188–202 (2007).
    • (2007) Springer Verlag Berlin Heidelberg , pp. 188-202
    • Tews, E.1    Weinmann, R.P.2    Pyshkin, A.3
  • 5
    • 70450239506 scopus 로고    scopus 로고
    • A. Y.Teymorian, X. Cheng and M. Song, RAP: Protecting commodity Wi-Fi networks from rogue access points. In the Proceedings of Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops
    • L. Ma, A. Y.Teymorian, X. Cheng and M. Song, RAP: Protecting commodity Wi-Fi networks from rogue access points. In the Proceedings of Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops, ACM New York USA, pp. 1–7 (2007).
    • (2007) ACM New York USA , pp. 1-7
    • Ma, L.1
  • 6
    • 84881131278 scopus 로고    scopus 로고
    • Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Computer Network Security, 6th International Conference on Mathematical Methods
    • Y. B. Mustapha, H. Debar and G. Jacob, Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. Computer Network Security, 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (Springer-Verlag Berlin Heidelberg 2012), pp. 203–217.
    • (2012) Models and Architectures for Computer Network Security (Springer-Verlag Berlin Heidelberg , pp. 203-217
    • Mustapha, Y.B.1    Debar, H.2    Jacob, G.3
  • 9
    • 85013366435 scopus 로고    scopus 로고
    • Motorola Solusions. AirDefense Enterprise: a wireless intrusion prevention, 2011
    • Motorola Solusions. AirDefense Enterprise: a wireless intrusion prevention, 2011.
  • 13
    • 84898862402 scopus 로고    scopus 로고
    • Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, Springer
    • J. Milliken, V. Selis and A. Marshall, Detection and analysis of the Chameleon WiFi access point virus. EURASIP Journal on Information Security, Springer, No. 1, (2013).
    • (2013) No , pp. 1
    • Milliken, J.1    Selis, V.2    Marshall, A.3
  • 14
    • 84930537693 scopus 로고    scopus 로고
    • Wireless rogue access point detection using shadow honeynet. International Journal of Wireless Personal Communications
    • N. Agrawal and S. Tapaswi, Wireless rogue access point detection using shadow honeynet. International Journal of Wireless Personal Communications, Springer Science+Business Media New York, Vol. 83, No. 1, pp. 551–570 (2015).
    • (2015) Springer Science+Business Media New York , vol.83 , Issue.1 , pp. 551-570
    • Agrawal, N.1    Tapaswi, S.2
  • 18
    • 38349014401 scopus 로고    scopus 로고
    • A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts, Computer and Network Security (Springer-Verlag
    • J. Song, H. Ohba, H. Takakura, Y. Okabe, K. Ohira and Y. Kwon, A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts, Computer and Network Security (Springer-Verlag, Berlin HeidelbergAdvances in Computer Science ASIAN, 2007. pp. 247–253.)
    • (2007) Berlin HeidelbergAdvances in Computer Science ASIAN , pp. 247-253
    • Song, J.1    Ohba, H.2    Takakura, H.3    Okabe, Y.4    Ohira, K.5    Kwon, Y.6
  • 20
    • 85013377676 scopus 로고    scopus 로고
    • http://ettercap.github.io/ettercap/
  • 21
    • 85013450418 scopus 로고    scopus 로고
    • http://www.wireshark.org/
  • 22
    • 85013366532 scopus 로고    scopus 로고
    • http://www.snort.org/
  • 23
    • 85013366535 scopus 로고    scopus 로고
    • https://www.pfsense.org/
  • 24
    • 85013394307 scopus 로고    scopus 로고
    • https://doc.pfsense.org/index.php/Setup_Snort_Package
  • 25
    • 85013450412 scopus 로고    scopus 로고
    • http://www.keyfocus.net/kfsensor/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.