Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP |
Jang, Rhong-Ho
(Inha University Computer Science Engineering)
Kang, Jeon-Il (Inha University Computer Science Engineering) Nyang, Dae-Hun (Inha University Computer Science Engineering) Lee, Kyung-Hee (The University of Suwon Electrical Engineering) |
1 | P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Enhancing the security of corporate Wi-Fi networks using DAIR," MobiSys, pp. 1-14, Uppsala, Sweden, Jun. 2006. |
2 | D. Schweitzer, W. Brown, and J. Boleng, "Using visualization to locate rogue access points," J. Computing Sci. Colleges, vol. 23, no. 1, pp. 134-140, Oct. 2007. |
3 | R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Global Telecommun. Conf., pp. 2271-2275, Dallas, USA, Nov. 2004. |
4 | W. Wei, K. Suh, B. Wang, Y. Gu, and J. Kurose, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-Pairs," in Proc. ACM SIGCOMM, pp. 365-378, San Diego, USA, Oct. 2007. |
5 | H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel and Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011. DOI ScienceOn |
6 | S. Kang, D. Nyang, J. Choi, and S. Lee, "Relaying rogue AP detection scheme using SVM," J. The Korea Inst. Inf. Security & Cryptology, vol. 23, no. 2, Jun. 2013. |
7 | J. Lee, S. Lee, and J. Moon, "Detecting rogue AP using k-SVM method," J. The Korea Inst. Inf. Security & Cryptology, vol. 24, no. 1, Feb. 2013. |
8 | UCLA.edu, [Click], http://read.cs.ucla.edu/click/click |