1 |
C. D. Mano and A. Striegel, "Resolving WPA limitations in SOHO and open public wireless networks," IEEE Wireless Communications and Networking Conference (WCNC 2006), pp.617-622, 2006.
|
2 |
J. Park, M. Park, and S. Jung, "A whitelistbased scheme for detecting and preventing unauthorized AP access using mobile device," Journal of Korean Institute of Communications and Information Sciences, Vol.38, pp.632-640, 2013.
|
3 |
J. Kim, A. Kim, J. Yuk, and H. Jung, "A Study on Wireless Intrusion Prevention System based on Snort," International Journal of Software Engineering and Its Applications, Vol.9, pp.1-12, 2015.
|
4 |
H. Kim, S. Kim, H. Lee, and H. Jung, "Lightweight System Design & Implementation for Wireless Intrusion Detection System," Journal of the Korea Institute of Information and Communication Engineering, Vol.18, pp.602-608, 2014.
DOI
|
5 |
N. Baharudin, F. H. M. Ali, M. Y. Darus, and N. Awang, "Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11," International Conference on IT Convergence and Security (ICITCS), pp.1-5, 2015.
|
6 |
https://www.aircrack-ng.org/index.html.
|
7 |
W. Hsieh, C. Lo, J. Lee, and L. Huang, "The implementation of a proactive wireless intrusion detection system," International Conference on Computer and Information Technology (CIT'04), pp.581-586, 2004.
|
8 |
G. Chen, H. Yao, and Z. Wang, "An intelligent WLAN intrusion prevention system based on signature detection and plan recognition," International Conference on Future Networks (ICFN'10), pp.168-172, 2010.
|
9 |
C. He and J. C. Mitchell, "Analysis of the 802.11 i 4-Way Handshake," ACM workshop on Wireless security, pp.43-50, 2004.
|
10 |
Ar Kar Kyaw, Yuzhu Chen, and Justin Joseph, "Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2," IEEE International Conference on Information Security and Cyber Forensics (InfoSec), pp.165-170, 2015.
|
11 |
http://invisible-island.net/xterm/
|
12 |
https://www.wireshark.org/
|