JOURNAL BROWSE
Search
Advanced SearchSearch Tips
A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device
Park, Jungsoo; Park, Minho; Jung, Souhwan;
  PDF(new window)
 Abstract
In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.
 Keywords
WLAN security;Rogue AP;Remote Server;BYOD;Whitelist;
 Language
Korean
 Cited by
1.
무선랜 침입탐지를 위한 경량 시스템 설계 및 구현,김한길;김수진;이환규;정회경;

한국정보통신학회논문지, 2014. vol.18. 3, pp.602-608 crossref(new window)
2.
모바일 비즈니스를 위한 모바일 미들웨어 시스템 설계 및 구현,이일주;

한국통신학회논문지, 2014. vol.39B. 2, pp.102-113 crossref(new window)
3.
데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계,장승주;김성진;

한국통신학회논문지, 2014. vol.39C. 8, pp.716-721 crossref(new window)
4.
방향성 가중치가 적용된 모듈기반의 개선된 하이브리드 침입시도탐지모델,이세열;안재현;

한국지식정보기술학회논문지, 2014. vol.9. 6, pp.685-690
5.
다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법,강성배;양대헌;이경희;

한국통신학회논문지, 2015. vol.40. 2, pp.334-348 crossref(new window)
6.
PS-Net : 개인별 보안 Wi-Fi 네트워크,이남세;이주호;정충교;

한국통신학회논문지, 2015. vol.40. 3, pp.497-505 crossref(new window)
7.
금융 폐쇄망 환경에서의 비인가 인터넷 접속 노드 탐지 기법,조형진;김은진;김휘강;

한국지식정보기술학회논문지, 2015. vol.10. 6, pp.653-664
8.
DHCP 스누핑 기반의 비인가 AP 탐지 기법,박승철;

인터넷정보학회논문지, 2016. vol.17. 3, pp.11-18 crossref(new window)
 References
1.
H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011. crossref(new window)

2.
J. Burke, B. Hartselle, B. Kneuven, and B. Morgan, Wireless security attacks and defense, Retrieved May 2006, from http://http://www.windowsecurity.com/whitepapers/Wireless_Security/Wireless-Security-Attacks-Defenses.html.

3.
D. Inoue, R. Nomura, and M. Kuroda, "Transient MAC address scheme for untraceability and DOS attack resiliency on wireless network," in Proc. Wireless Telecommun. Symp., pp. 15-23, Pomona, U.S.A., Apr. 2005.

4.
H. Hwang, G. Jung, K. Sohn, and S. Park "A study on MITM(Man in the Middle) vulnerability in wireless network using 802.1X and EAP," in Proc. Int. Conf. Inform. Sci. Security (ICISS '08), pp. 164-170, Hyderabad, India, Jan. 2008.

5.
AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.

6.
L. Liu, R. Moulic, and D. Shea, "Cloud service portal for mobile device management," in Proc. IEEE 7th Int. Conf. e-Business Eng. (ICEBE), pp. 474-478, Shanghai, China, Nov. 2010.

7.
A. Scarfò, "New security perspectives around BYOD," in Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446-451, Victoria, Canada, Nov. 2012.

8.
G. Chen, H. Yao, and Z. Wang, "An intelligent WLAN intrusion prevention system based on signature detection and plan recognition," In Proc. 2nd Int. Conf. Future Networks (ICFN '10), pp. 168-172, Sanya, China, Jan. 2010.

9.
H.-W. Lee and C.-W. Choi, "Development of malicious traffic detection and prevention system by embedded module on wireless LAN access point," J. Korea Contents Assoc. (KOCON), vol. 6, no. 12, pp. 29-39, Dec. 2006.