DOI QR코드

DOI QR Code

라즈베리파이를 이용한 전용 WIPS 센서 구현

Implementing a Dedicated WIPS Sensor Using Raspberry Pi

  • 윤광욱 (부산대학교 전자전기컴퓨터공학부) ;
  • 최석환 (부산대학교 전자전기컴퓨터공학부) ;
  • 안상언 (부산대학교 전자전기컴퓨터공학부) ;
  • 김정구 (부산대학교 전자전기컴퓨터공학부) ;
  • 최윤호 (부산대학교 전자전기컴퓨터공학부)
  • 투고 : 2016.11.23
  • 심사 : 2017.04.12
  • 발행 : 2017.07.15

초록

무선 네트워크를 이용한 사용자의 업무 편의성 및 효율성이라는 순기능은 보안 위협이 발생하면 심각한 네트워크 자원 가용성의 침해와 더불어 중요한 기업 정보의 유출로 이어질 수 있다. 특히 무선 AP(Access Point)를 통해 보안 취약점을 악용한 다양한 보안 공격과 이로 이한 피해가 늘어나고 있다. 이러한 다양한 공격에 대항하고 내부망을 보호하기 위해 공공기관 및 기업에서 WIPS(Wireless Intrusion Prevention System)를 도입하는 사례가 늘어나고 있다. 하지만, WIPS 솔루션 도입시 고려해야 할 높은 비용은 개인 또는 소규모 회사에서의 WIPS 솔루션 도입을 방해하는 주요 이슈이다. 본 논문에서는 WIPS 솔루션 도입에 따른 비용 문제를 절감하고 다양한 무선랜 보안 위협들을 차단하기 위한 라즈베리 파이를 이용한 WIPS 센서 구현 방안을 제안한다. 이를 통해 비교적 낮은 비용으로 기업 정보를 보호하고 서비스 연속성을 제공할 수 있을 것으로 기대한다.

Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take advantage of the vulnerabilities created by a wireless AP (Access Point). Public organizations and companies have gradually selected the WIPS (Wireless Intrusion Prevention System) to block wireless security threats and protect the internal network. However, it is very costly for other organizations and companies to introduce the WIPS solution. This paper proposes implementing a WIPS Sensor by using Raspberry Pi to reduce these costs and to block the various wireless LAN security threats. This implementation would protect corporate information and provide consistent services at a relatively reasonable price.

키워드

과제정보

연구 과제 주관 기관 : 한국연구재단

참고문헌

  1. Kim Ji-an, 2014, "wireless Network Security Threat Countermeasures WIPS," Available:http://www.boannews.com/media/view.asp?idx=39719
  2. A. Scarfo, "New security perspectives around BYOD," Proc. 7th Int. Conf. Broadband, Wireless Computing, Commun., Applicat. (BWCCA), pp. 446- 451, Victoria, Canada, Nov. 2012.
  3. Robert Mitchell, Ing-Ray Chen, "A survey of intrusion detection in wireless network applications," Journal Computer Communications archive Volume 42 pp. 1-23, Apr. 2014.
  4. Jungsoo Park, Minho Park, Souhwan Jung, A whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device, KICS 13-08, Vol. 38B, Aug. 2013. https://doi.org/10.7840/kics.2013.38B.8.632
  5. AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
  6. Lee Gi Hyouk, Young Jae Dong, "A Study on the Construction instance of the Wireless Intrusion Prevention System for illegal AP detection threat preventions," Proc. of Symposium of the Korean Institute of communications and information Sciences, pp. 1004-1015, November, 2008
  7. Md. Waliullah, Diane Gan, "Wireless LAN Security Threats & Vulnerabilities : A Literature Review," International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 5, No. 1, 2014.
  8. Sushma, Deepak Nandal, Vikas Nanda, "Security Threats in Wireless Sensor Networks," International Journal of Computer Science & Management Studies(IJCSMS), Vol. 11, Issue 01, May 2011.
  9. Bellardo J, Savage S, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," USENIX security (pp. 15-28), Aug. 2003.
  10. Aslam, Baber, M. Hasan Islam, and Shoab A. Khan, "802.11 disassociation DoS Attack and its solutions: A survey," Mobile Computing and Wireless Communication International Conference, 2006. MCWC 2006, Proc. of the First. IEEE, 2006, Sep. 2006.
  11. Onat I, Miri A, "An intrusion detection system for wireless Sensor networks," WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005, Vol. 3, pp. 253-259. IEEE, Aug, 2005.
  12. Karen Scarfone, "Comparing the top wireless intrusion prevention systems," Wireless intrusion prevention systems: A buyer's guide, Scarfone Cybersecurity, 2016.
  13. Han-Kil Kim, Su-Jin Kim, Hwan-Kyu Lee, Hoekyung Jung, Light-weight System Design & Implementation for Wireless Intrusion Detection System, Journal of the Korea Institute of informaion and, Vol. 18, No. 3, pp. 602-608, Mar. 2014. https://doi.org/10.6109/jkiice.2014.18.3.602
  14. Woo-Hyuk Jung, Seung-hyung Lee, "Detecting and responding to security attacks about AP, The Journal of The Korean Institute of Communication Sciences," 2016.
  15. Sansung, "Samsung wireless Enterprise sanmsung security AP, WHITE PAPER," 2013.