• Title/Summary/Keyword: WIPS

Search Result 35, Processing Time 0.022 seconds

Implementing a Dedicated WIPS Sensor Using Raspberry Pi (라즈베리파이를 이용한 전용 WIPS 센서 구현)

  • Yun, Kwang-Wook;Choi, Suck-Hwan;An, Sang-Un;Kim, Jeong-Goo;Choi, Yoon-Ho
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.397-407
    • /
    • 2017
  • Wireless networks make the users' work more convenient and efficient, but such networks can impair the availability of network resources and can cause leakage of important corporate information when there are security threats. In particular, damage has increased because of security attacks that take advantage of the vulnerabilities created by a wireless AP (Access Point). Public organizations and companies have gradually selected the WIPS (Wireless Intrusion Prevention System) to block wireless security threats and protect the internal network. However, it is very costly for other organizations and companies to introduce the WIPS solution. This paper proposes implementing a WIPS Sensor by using Raspberry Pi to reduce these costs and to block the various wireless LAN security threats. This implementation would protect corporate information and provide consistent services at a relatively reasonable price.

A Study of WIPS(Wireless Intrusion Prevention System)'s Security Functional Requirements based on Common Criteria Version 3.1 (CC V3.1 기반의 무선침입방지시스템(WIPS) 보안기능 요구사항에 관한 연구)

  • Lee, Hyun-Jung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.85-90
    • /
    • 2010
  • 무선은 편리함만큼 위험성도 높다. 누구나 편리하게 접속할 수 있는 것은 장점이지만, 이 누군가가 악의적 목적의 공격자라면 장점이 아닌 단점으로 순식간에 변화할 수 있는 것이다. 이에 무선 네트워크를 보호할 수 있는 방안 마련은 무선랜 활성화의 선행과제로 꼽힌다. 무선랜 보안의 한 축으로 무선침입탐지시스템(WIDS) 혹은 무선침입방지시스템(WIPS)이라고 불리는 보안시스템 구축에 대한 요구가 증가하고 있는 추세이다. 이에 본 논문에서는 무선침입방지시스템에 대한 보안기능 요구사항을 개발한다. 개발된 보안기능 요구사항은 WIPS 제품 개발자, 제품 도입자 및 WIPS 제품 평가자가 시스템 평가 및 도입 시 참고자료로 충분히 활용될 수 있다.

  • PDF

Light-weight System Design & Implementation for Wireless Intrusion Detection System (무선랜 침입탐지를 위한 경량 시스템 설계 및 구현)

  • Kim, Han-Kil;Kim, Su-Jin;Lee, Hwan-Kyu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.602-608
    • /
    • 2014
  • Smartphones have become commonplace to use smart, BYOD (Bring Your Own Device) spread the trend of domestic WLAN use is intensifying as a result, the security threat will be greatly increased. Even though WLAN vendors such as Cisco Systems Inc,. Aruba networks released WIPS, MDM, DLP etc, however, these solutions can not be easily introduced for small business due to high cost or administrative reasons. In this paper, without the introduction of expensive H/W equipment, in WLAN environments, packet analysis, AP, Station management, security vulnerabilities can be analyzed by the proposed intrusion detection system.

A Daily Production Planning Method for Improving the Production Linearity of Semiconductor Fabs (반도체 Fab의 생산선형성 향상을 위한 일간생산계획 방법론)

  • Jeong, Keun-Chae;Park, Moon-Won
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.275-286
    • /
    • 2015
  • In this paper, we propose a practical method for setting up a daily production plan which can operate semiconductor fabrication factories more stably and linearly by determining work in process (WIP) targets and movement targets. We first adjust cycle times of the operations to satisfy the monthly production plan. Second, work in process (WIP) targets are determined to control the production progress of operations: earliness and tardiness. Third, movement targets are determined to reduce cumulated differences between WIP targets and actual WIPs. Finally, the determined movement targets are modified through a simulation model which considers capacities of the equipments and allocations of the WIPs in the fab. The proposed daily production planning method can be easily adapted to the memory semiconductor fabs because the method is very simple and has straightforward logics. Although the proposed method is simple and straightforward, the power of the method is very strong. Results from the shop floor in past few periods showed that the proposed methodology gives a good performance with respect to the productivity, workload balance, and machine utilization. We can expect that the proposed daily production planning method will be used as a useful tool for operating semiconductor fabrication factories more efficiently and effectively.

Trend for Waste Plastic Recycling Technology by Patent Analysis (특허분석(特許分析)에 의한 폐플라스틱 재활용(再活用) 기술(技術) 동향(動向))

  • Kim, Tae-Hyun;Rhee, Kang-In;Kim, Yu-Ri
    • Resources Recycling
    • /
    • v.19 no.2
    • /
    • pp.63-72
    • /
    • 2010
  • The patents were searched to investigate the trend of recycling technologies about plastic waste. Database was collected from WIPS site and the range of the search was limited to patents opened in U.S.A (US), European Union (EU), Japan (JP) and Korea (KR) to september 2009. In this paper, 4,795 patents were selected by investigation abstracts and the trend of the recycling technologies relating to waste plastic were investigated through the analyzing by the years, countries, companies. The patents were occupied 65% by Japan and the most of the patents were about chemical recycling. In the case of Korea, material recycling was major in the patents of waste plastic recycling.

Analysis of Tendencies on WLAN Security Technology (무선랜 보안 기술 및 운영 현황 분석)

  • Kim, Su-Jin;Seo, Jong-Kyun;Han, Ki-Cheon;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.685-687
    • /
    • 2013
  • Today, as wireless communications devices such as laptops, smart phones are generalized, wireless LAN has been widely installed in the corporate office conference rooms, industrial warehouses, Internet-ready classrooms, and even in a coffee shop. Though a wired network can be accessed and attacked only by the physical penetration, the wireless network which can be accessed anywhere within the reach of anyone has relative vulnerability by unauthorized users' attack. To defend these vulnerabilities, the introduction of WIDS / WIPS is required. In this paper, we recognize the limitations of WLAN security technology, review the current technology trends and propose the solutions in the future security problems.

  • PDF

Discharge Characteristics of Wire Ion Plasma Source (와이어.이온.플라즈마원의 방전 특성)

  • Ko, Kwang-Cheol;Hotta, Eiki
    • Proceedings of the KIEE Conference
    • /
    • 1997.07e
    • /
    • pp.1776-1778
    • /
    • 1997
  • WIPS is a plasma device which has a wire anode, a coaxially-set cylindrical cathode, and aperture electrodes located in both ends of the cylinder. This electrode configuration forces the potential between the anode and the cathode to change logarithmically with radial direction. Since electrons are confined this logarithmic potential, the high-density plasma is produced even at a rather low anode voltage. In this paper we investigate characteristics of dc and pulse discharges, in which

  • PDF

A Whitelist-Based Scheme for Detecting and Preventing Unauthorized AP Access Using Mobile Device (모바일 단말을 이용한 Whitelist 기반 비인가 AP 탐지 및 접속 차단 기법)

  • Park, Jungsoo;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.632-640
    • /
    • 2013
  • In this paper, we proposed a system in a wireless LAN environment in case of security threats, the mobile terminal and the remote server-based WLAN security. The security of the wireless LAN environment in the recent technology in a variety of ways have been proposed and many products are being launched such as WIPS and DLP. However, these products are expensive and difficult to manage so very difficult to use in small businesses. Therefore, in this paper, we propose a security system, wireless LAN-based terminal and a remote server using whitelist according to development BYOD market and smartphone hardware. The proposed system that AP and personal device information to be stored on the server by an administrator and Application installed on a personal device alone, it has the advantage that can be Applicationlied to a variety of wireless network environment.

Trend and Barrier in the Patents of Artificial Recharge for Securing Goundwater (지하수자원 확보를 위한 인공함양 기술 특허동향 및 장벽 분석)

  • Kim, Yong-Cheol;Seo, Jeong-A;Ko, Kyung-Seok
    • Journal of Soil and Groundwater Environment
    • /
    • v.17 no.3
    • /
    • pp.59-75
    • /
    • 2012
  • It is getting difficult to manage water resources in South Korea because more than half of annual precipitation is concentrated in the summer season and its intensity is getting severe due to global warming and climate change. Artificial recharge schemes can be a useful method to manage water resources in Korea adapting to climate change. Patent analysis enables us to prevent overlapping investment and to find out unoccupied technology. In this study, international patent trends and barriers of artificial recharge technology are analysed for patents of Korea, Japan, the United States and Europe. The four artificial recharge methods such as well recharge, surface infiltration, bank filtration and underground structures are classified as main class and the nine sub-technologies such as water intake, water treatment, injection wells, monitoring of groundwater flow, groundwater pumping, surface infiltration/soil aquifer treatment, radial collection well, iron/manganese treatment, and underground subsurface dam are classified as intermediate class. Water intake techniques are subdivided into five classifications. Total 1,281 of patents, searched by WIPS DB tool and selected after removing noisy patents, are analyzed quantitatively to evaluate application trends by year, applicant, country for each classified technologies and analyzed qualitatively to find out occupied and unoccupied technologies. It is expected that upcoming research and development project could be performed efficiently in that an avoidance plan for the similar patents and differentiation plan for the advancing patents are set up based on the quantitative and qualitative analysis results from this research.