Browse > Article
http://dx.doi.org/10.6109/jkiice.2014.18.5.1122

A Study on Signature-based Wireless Intrusion Detection Systems  

Park, Sang-No (Department of Computer Engineering, Paichai University)
Kim, A-Yong (Department of Computer Engineering, Paichai University)
Jung, Hoe-Kyung (Department of Computer Engineering, Paichai University)
Abstract
WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.
Keywords
Common Criteria; Backtrack; Snort; Signature; Intrusion Detection System;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Andrew. Lockhart, "Snort Wireless Users Guide," 2003.
2 K. S. Kou, G. J. Mun, D. J. Ryu, "A Development of AIRTMS V1.0's Security Functional Requirements based on Common Criteria Version 3.1," Journal of Security Engineering, vol. 8, no. 6, pp. 645-655, Dec. 2011.
3 Y. S. Kim, K. S. Kou, J. I. Sin and Y. H. Bang, "Development of Security Functional Requirement Specification Tool of Information Security Operational System Level," Journal of Security Engineering, vol.7, no.1, Feb. 2010.
4 S. Y. Kang and J. H. Park, "The Research about Recent Common Criteria of Information Security Product," Journal of Security Engineering, vol.5, no.4, Aug. 2008.
5 Craig. Valli, "Wireless Snort-A WIDS in progress," Network & Information Forensics Conference, pp. 112-116, 2004.
6 Reddy, S. Vinjosh, et al. "Wireless hacking-a WiFi hack by cracking WEP," 2010 2nd International Conference on, vol. 1, pp. 189-193, 2010.
7 Ajita. Mishra and Ashish Kumar Srivastava, "A Modular Approach To Intrusion Detection in Homogenous Wireless Network," IOSR Journal of Computer Engineering, vol. 14, no. 6, pp. 53-59, Oct. 2013.
8 Martin. ROESCH, "Snort: Lightweight Intrusion Detection for Networks," Proceedings of LISA, pp. 229-238, 1999.
9 Steven T. Eckmann, "Translating Snort rules to STATL scenarios," Proc. Recent Advances in Intrusion Detection, 2001.
10 H. S. Kim, B. J. Kang, J. S. Yang and E. G. Im, "An Efficient Signature Detection Method using Growing Prefix Indexing for Intrusion Detection Systems," Journal of Security Engineering, vol. 9, no.1, Feb. 2012.