Browse > Article
http://dx.doi.org/10.18807/jsrs.2016.6.3.079

Hacking Countermeasures for Wireless Internet Service  

Kook, Jung Gak (Sahmyook University, Division of Computer Engineering)
Kim, Hee Wan (Sahmyook University, Division of Computer Engineering)
Publication Information
Journal of Service Research and Studies / v.6, no.3, 2016 , pp. 79-90 More about this Journal
Abstract
Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.
Keywords
Wireless Internet; Service; Hacking Technology; Hacking Countermeasures; Encryption Algorithm;
Citations & Related Records
Times Cited By KSCI : 8  (Citation Analysis)
연도 인용수 순위
1 S.M. Park, H.J. Kim, J.G. Kim, T.G. Hwang, and S.J. Lee(2013), "Design and Implementation of Multiple Access Game Control System using Bluetooth", Journal of IKEEE, Vol.17, No.4, 492-498 (박상면, 김호진, 김정길, 황태규, 이상준 (2013), "블루투스를 이용한 다중접속 게임 제어 시스템의 설계 및 구현," 전기전자학회논문지,)   DOI
2 J.A. Son, and K.M. Heo(2013), "Fear and Measures of Motor Vehicles Communication Network Hacking", Korean Police Studies Review, Vol.12, No.1, 113-142 (손정아, 허경미(2013), "자동차 통신 네트워크 해킹의 위험 및 대책," 한국경찰연구 12(1), 113-142 )
3 S.H. Hong(2013), "Disconnection of Wireless LAN Attack and Countermeasure", Journal of Digital Convergence, Vol.11, No.12, 453-458 (홍성혁(2013), "무선 LAN 연결 해제 공격과 보안," 디지털융복합연구 11(12), 453-458)   DOI
4 H.B. Shim(2012),"Comparative analysis for advanced technologies of the location based service", Journal of the Korea Institute of Information and Communication Sciences, Vol.16, No.4, 853-871 (심현보(2012), "위치기반 서비스 고도화 기술 비교 분석," 한국정보통신학회논문지 16(4), 853-871 )   DOI
5 J.H. Choi, and S.H. Oh(2012), "Study on Vulnerability and Countermeasures of Authentication Mechanism in Wireless LAN", Journal of the Korea Institute of Information Security & Cryptology, Vol.22, No.6, 1219-1230 (최진호, 오수현(2012), "무선 랜 환경 인증 메커니즘의 취약성 분석 및 대응방안 연구,"정보보호학회논문지 22(6), 1219-1230)
6 K.S. Lee, and H.S. Seo(2010), "The Methodology of Access Point Default WEP Key an Alteration", Journal of Knowledge Information Technology and Systems, Vol.15, No.4, 1-8 (이기성, 서희석(2010), "액세스 포인트의 디폴트 WEP키 변경 방법론," 한국지식정보기술학회논문지 5(4), 1-8 )
7 S.R. Lee, and Y.J. Park(2004), "Design of PKI Cryptosystem enabling Efficient Mutual Authentication on Wireless LAN", The institute of Electronics Engineers of korea, Vol.41, No.3, 69-78 (이상렬, 박용진(2004), "무선랜에서 효율적인 상호인증이 가능한 PKI 보안시스템 설계, 전자공학학회눈문지 41(3), 69-78 )
8 S.W. Jang, and K.Y. Kim(2013), "Detection of Network Attacks Based on an Improved Clustering Algorithm", Journal of Korean Institute of Information Technology, Vol.11, No.3, 141-150 (장석우, 김계영(2013), "개선된 클러스터링 알고리즘 기반의 네트워크 공격 탐지," 한국정보기술학회논문지 11(3), 141-150 )
9 J.S. Hong, N.O. Park and W.H. Park(2012), "Detection System Model of Zombie PC using Live Forensics Techniques", The Journal of Society for e-Business Studies, Vol.17, No.3, 117-128 (홍준석, 니오박, 박원형(2012), "활성 포렌식 기술을 이용한 좀비 PC 탐지시스템 모델,"한국전자거래학회지 17(3), 117-128 )