A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion

Size: px
Start display at page:

Download "A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion"

Transcription

1 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion Hyeokchan Kwon 1, Sin-Hyo Kim 1, 1 Electronics and Telecommunications Research Institue, 218 Gajeong-ro, Yuseong-gu, Daejeon, KOREA {hckwon, shykim}@etri.re.kr Abstract. In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. Current wireless intrusion prevention system classifying the mobile s into three or four categories: authorized, unauthorized, guest and external. By contrast, the proposed mechanism classified mobile s into 9 categories. For a variety of classification, the proposed mechanism utilizes the -related real-time events from mobile management system and authorization system. This mechanism also provides the security policy generation steps for controlling mobile s access to s in the managed wireless network. The advantage of this mechanism against traditional approach is to identify and take countermeasure against -related potential security threats in advance. Keywords: wireless intrusion prevention, mobile management, mobile classification, wireless access control 1 Introduction Currently, there exist several Wireless Intrusion Prevention System (WIPS) product to detect and prevent wireless intrusion such as IT, DoS attack, rogue (access point)-based attack, unauthorized network access by the mobile and so on. WIPS consist of wireless threat management server that manages overall WLAN threat/security and wireless sensors that monitors radio frequency signals for the presence of rogue access point, unauthorized, unauthorized association, malicious traffic and so forth. Current WIPS classifying the mobile s into three or four categories: authorized, unauthorized, guest and external for preventing wireless intrusion. In case of AirTight [1], a representative wireless intrusion prevention system, classifying the mobile s into three categories: authorized, unauthorized and neighbor. In case of, they classified into three categories: authorized, rogue and external. Previous works on classification for preventing wireless intrusion have difficulty to subtle control the wireless access between mobile s to s because of its simple classification mechanism. And it cannot identify potential threats because its classification mechanism does not reflect the vulnerable state of the such as jailbreaking, rooting and so on. ISI 2013, ASTL Vol. 25, pp , 2013 SERSC

2 Proceedings, The 2nd International Conference on Information Science for Industry In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. The proposed mechanism classified mobile s into 9 categories. Each category can be combined, and the category (or combined category) will be mapped into security level which is defined in this mechanism to set-up the security policy for control accesses to managed. In order to make a variety of classification, we utilize the -related events from mobile management system (called D) and authorization system (called AS). The -related events include status of such as authentication, jailbroken, rooted, lost, misplaced, acting role (tethering/hot-spot), deletion of D agent illegally and so on. Currently, WIPS and D are individual products and each is independently deployed and operated. The related research on the WIPS mechanism by utilizing additional -related events from the D has also not yet been investigated. The contents organized as follows. In section 2, we present mobile classification mechanism. Finally, conclusion is given in section 3. 2 obile Device Classification echanism In this section, we present mobile classification mechanism in WIPS system. Fig. 1 shows the system architecture for classifying the mobile. In Fig. 1, wireless intrusion prevention server utilizes the -related events from mobile management system (called D) and authorization system (called AS). In this mechanism, D server provide WIPS with information such as jailbreaking/rooting, lost, misplaced, acting role (tethering/hot-spot), deletion of D agent illegally and so on. And the authentication server provides WIPS with the list of authorized. Policy DB Event DB classification Device classification Access policy Classification policy. Events from AS Events from D server I/F I/F Authorization Server (AS) WIPS Server D Server : D agent Fig. 1. The system architecture for classifying the mobile 318

3 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion The received events are stored in the event database in Fig. 1, and WIPS server classifying the mobile by analyzing the information in the event database, and the classification information is stored in the policy database. The Table 1 shows the list of -related event from authorization server and D server. Table 1. Device-related event from authorization server (AS) and D server Interface AS WIPS D Server WIPS Server Event List of authorized by the authorization server List of authorized by the D server (i.e., list of with D agent) Jailbroken/rooted, Lost/misplaced, Deletion of D agent illegally Act as a wireless access point by using wi-fi tethering or hotspot application Fig. 2 shows the classification of access point and mobile in this mechanism. We classified the mobile into 9 categories and access point into 5 categories. The detailed classification criteria are described in the Table 2. The classification criteria could be determined by the security policy. The WIPS server classifying the mobile by analyzing the information of the event database which contains the received -related information from authorized server and D server. This paper focuses on the classification of mobile only. From the 9 classification in Table 2, the classification of authorized (AS), authorized (D), risky and tethering can only be classified through the interworking with authentication server and/or D server. classification obile classification (AS) Tethering Rogue Tethering/Soft (anual) (D) External Black-list External Uncategorized Guest risky Uncategorized Fig. 2. Classification of obile and Access Point () Each category can be combined, and the category (or combined category) will be mapped into security level which is defined to set-up the security policy for control accesses to managed. The mapping with security level can be done by wireless network administrator. The higher number of security level means the higher security risk. 319

4 Proceedings, The 2nd International Conference on Information Science for Industry The follows is an example of security policy using combined category mapped with security level. The symbol &, means and, or respectively. (D) & Risky Tethering Security level 2 : A that is classified as authorized (D) and classified as risky or tethering is mapped into the security level 2. Table 2. The classification criteria of mobile Classification Classification Criteria (AS) by the authorization server (anual) The classified as authorized by the WIPS server itself manually beforehand (D) Guest Risky by D server (i.e., with valid D agent) The classified as guest by the WIPS server itself manually beforehand Jailbroken/rooted or Lost In case that, D agent installed in the is deleted illegally Tethering The act as a wireless access point by using wi-fi tethering or hotspot application External The not allowed by the wireless network administrator, but located on the outside of the managed physical domain (e.g., campus, building) and/or not connected with network segment to be protected. Black-list The listed in the blacklist Uncategorized Uncategorized WIPS self-detected information Device related event (from AS and D server) Classify mobile using classification algorithm Device classification ap the classification onto security level Security level Create an access control policy classification Fig. 3. Set-up an Access Control Policy In this mechanism, we defined four levels of access control: Permit (permit access), Prohibit (prohibit access), Inform (inform network administrator of connectivity information), Ignore (ignore the connectivity). The fundamental step to set up an access control policy is shown in Fig. 3. The access control policy in Fig.3 is created by network administrator, and it defines access control between security level and 320

5 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion classification. For example, the access control policy permit level_2 s to access authorized and prohibit level_3 s to access rogue and so on. 3 Conclusion In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. Previous works on classification for preventing wireless intrusion have difficulty to subtle control the wireless communication between mobile s to s, because of its simple classification mechanism. And it cannot identify potential threats because its classification mechanism does not reflect the vulnerable state of itself such as jailbreaking, rooting and loss. In our mechanism, for a variety of classification, we utilize the related events from D and authorization system (called AS). In this approach, we can classify the mobile into 9 categories. To make security policy for preventing wireless intrusion the following steps are presented: (1) Classify mobile using classification algorithm (2) aps classification to security level (3) Create an access control policy using the security level and access point classification. The advantage of this approach is to identify and take countermeasure against -related potential security threats in advance. Such security threats could be arising from the which is jailbroken, rooted, loss and so on. Currently, we are planning to extend the classification mechanism to consider additional mobile related information such as -activity. Acknowledgement This research funded by the ISP (inistry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2013 References 1. AirTight: ethod and system for monitoring a selected region of an airspace associated with local area networks of computer s, Patent, AirTight, US 7,002,943 (2006) 2. R. Beyah, A. Venkataramen: Rogue-Access-Point Detection Challenges, Solutions, and Future Directions, IEEE Security & Privacy, vol. 9, issue 5, pp , IEEE (2011) 3. Tarek S. Sobh, Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, vol. 28, issue 6, pp , Computer Standards & Interfaces, Elsevier (2006) 4. Anyclick AIR, UNETsystem 321

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information

WIDS Technology White Paper

WIDS Technology White Paper Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...

More information

Multipot: A More Potent Variant of Evil Twin

Multipot: A More Potent Variant of Evil Twin Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks http://www.airtightnetworks.net Email: gopinath.kn@airtightnetworks.net

More information

HP0-Y39. Managing and Troubleshooting Enterprise Wireless Networks. Download Full Version :

HP0-Y39. Managing and Troubleshooting Enterprise Wireless Networks. Download Full Version : HP HP0-Y39 Managing and Troubleshooting Enterprise Wireless Networks Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-y39 QUESTION: 37 RF Manager has determined that a Rogue access

More information

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version :

Cisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : https://killexams.com/pass4sure/exam-detail/300-375 QUESTION: 42 Which two considerations must a network engineer

More information

Standard For IIUM Wireless Networking

Standard For IIUM Wireless Networking INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version

More information

Chapter 1 Describing Regulatory Compliance

Chapter 1 Describing Regulatory Compliance [ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know

More information

A Design of Building Group Management Service Framework for On-Going Commissioning

A Design of Building Group Management Service Framework for On-Going Commissioning , pp.84-88 http://dx.doi.org/10.14257/astl.2014.49.18 A Design of Building Group Management Service Framework for On-Going Commissioning Taehyung Kim 1, Youn Kwae Jeong 1 and Il Woo Lee 1, 1 Electronics

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

Securing Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS)

Securing Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS) Securing Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS) Introduction The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop,

More information

LESSON 12: WI FI NETWORKS SECURITY

LESSON 12: WI FI NETWORKS SECURITY LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information

More information

Design and Implementation of Secure OTP Generation for IoT Devices

Design and Implementation of Secure OTP Generation for IoT Devices , pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

Detecting & Eliminating Rogue Access Point in IEEE WLAN

Detecting & Eliminating Rogue Access Point in IEEE WLAN Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.

More information

5 Tips to Fortify your Wireless Network

5 Tips to Fortify your Wireless Network Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In

More information

Optimized Wireless LAN Plan An AirTight Service. For

Optimized Wireless LAN Plan An AirTight Service. For Optimized Wireless LAN Plan An AirTight Service For Sample Customer The Global Leader in Wireless Vulnerability Management AirTight Networks 339 N. Bernardo Avenue #200 Mountain View, CA 94043 www.airtightnetworks.com

More information

Cyber Security Guidelines for Public Wi-Fi Networks

Cyber Security Guidelines for Public Wi-Fi Networks Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description

More information

HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS

HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS HP Networking Exam Preparation Guide HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS HP Networking Exam Preparation Guide Overview Requirements for

More information

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne

What is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.

More information

What s New in ZoneFlex Software Release 9.4

What s New in ZoneFlex Software Release 9.4 What s New in ZoneFlex Software Release 9.4 This application note describes the new features available in Version 9.4 of the Ruckus Wireless ZoneFlex family. This document assumes familiarity with the

More information

A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles

A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles 6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 146 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence , pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,

More information

A Virtual-Synchronized-File Based Privacy Protection System

A Virtual-Synchronized-File Based Privacy Protection System Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System

More information

Samsung Security AP WHITE PAPER

Samsung Security AP WHITE PAPER WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

AirMagnet Enterprise DATASHEET

AirMagnet Enterprise DATASHEET DATASHEET AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations to

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.

More information

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design

More information

CSA for Mobile Client Security

CSA for Mobile Client Security 7 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including comprehensive endpoint security that is critical to

More information

SDN-Based Network Security Functions for VoIP and VoLTE Services

SDN-Based Network Security Functions for VoIP and VoLTE Services SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,

More information

Securing Wireless LANs with Certificate Services

Securing Wireless LANs with Certificate Services 1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the

More information

QuickSpecs. Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor

QuickSpecs. Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor Overview Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor J9521A J9522A Key features Full support for HP and 3rd party WLANs Automatic intrusion threat prevention Central

More information

IC32E - Pre-Instructional Survey

IC32E - Pre-Instructional Survey Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into

More information

WHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis

WHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis WHY ARMIS Top 10 Reasons To Consider Armis 1. Comprehensive Asset Discovery and Inventory A complete inventory of hardware and software is critically important. This is why so many security frameworks,

More information

Detecting Protected Layer-3 Rogue APs

Detecting Protected Layer-3 Rogue APs Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science

More information

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1

TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 , pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,

More information

The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol

The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol Abstract The TETRA system provides an authentication service which permits only the authorized terminal to access its network

More information

EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India

EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India Abstract Now a days wireless access points are widely

More information

Wireless Network Security

Wireless Network Security Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless

More information

Cisco ONE for Access Wireless

Cisco ONE for Access Wireless Data Sheet Cisco ONE for Access Wireless Cisco ONE Software helps customers purchase the right software capabilities to address their business needs. It helps deliver reduced complexity, simplified buying,

More information

Cisco Unified Wireless Network Solution Overview

Cisco Unified Wireless Network Solution Overview 1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers

More information

Basic Wireless Settings on the CVR100W VPN Router

Basic Wireless Settings on the CVR100W VPN Router Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.

More information

CS-MARS Integration for Cisco Unified Wireless

CS-MARS Integration for Cisco Unified Wireless 9 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including cross-network anomaly detection and correlation that

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Classifying Rogue Access Points

Classifying Rogue Access Points Finding Feature Information, page 1 Information About, page 1 Restrictions for, page 4 How to Classify Rogue Access Points, page 5 Viewing and Classifying Rogue Devices (GUI), page 9 Examples:, page 11

More information

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the

More information

esight V300R001C10 WLAN Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

esight V300R001C10 WLAN Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. V300R001C10 Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written

More information

AirMagnet Enterprise DATA SHEETS PRINT

AirMagnet Enterprise DATA SHEETS PRINT DATA SHEETS PRINT AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations

More information

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:

Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1

More information

One Management Realized, with Cisco Prime Infrastructure Manage Complexity. Manage Effectively. Manage Intelligently. Closing

One Management Realized, with Cisco Prime Infrastructure Manage Complexity. Manage Effectively. Manage Intelligently. Closing One Management Realized, with Cisco Prime Infrastructure Manage Complexity Manage Effectively Manage Intelligently Closing 2 2013 Cisco and/or its affiliates. All rights reserved. Internet of Things 99%

More information

Classifying Rogue Access Points

Classifying Rogue Access Points Finding Feature Information, page 1 Information About, page 1 Restrictions on, page 4 How to Classify Rogue Access Points, page 5 Viewing and Classifying Rogue Devices (GUI), page 10 Examples:, page 12

More information

RSA Ready Implementation Guide for

RSA Ready Implementation Guide for RSA Ready Implementation Guide for AirTight Networks SpectraGuard Enterprise (SGE) 6.7 Daniel R. Pintal, RSA Partner Engineering Last Modified: February 12, 2016 Solution

More information

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]

Cisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers

More information

Identity and Client Security for Remote Access Virtual Credential Container

Identity and Client Security for Remote Access Virtual Credential Container Identity and Client Security for Remote Access Virtual Credential Container Yukio Tsuruoka NTT Information Sharing Platform Laboratories Contents About NTT Background Outline Client security Use case:

More information

A Load Balancing Scheme for Games in Wireless Sensor Networks

A Load Balancing Scheme for Games in Wireless Sensor Networks , pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,

More information

Configuring Security Solutions

Configuring Security Solutions 3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

Requirements for Building Effective Government WLANs

Requirements for Building Effective Government WLANs White Paper Government Requirements for Building Effective Government WLANs CJ Mathias Farpoint Group Introduction With governments just now beginning the adoption of wireless LANs as a key component of

More information

COPYRIGHTED MATERIAL. Contents

COPYRIGHTED MATERIAL. Contents Contents Foreword Introduction xxv xxvii Assessment Test xxxviii Chapter 1 WLAN Security Overview 1 Standards Organizations 3 International Organization for Standardization (ISO) 3 Institute of Electrical

More information

Systematic Security Checking on OSGi Bundles for Remote Healthcare System

Systematic Security Checking on OSGi Bundles for Remote Healthcare System , pp.1-5 http://dx.doi.org/10.14257/astl.2015.116.01 Systematic Security Checking on OSGi Bundles for Remote Healthcare System Jinsoo Hwang 1, Kichang Kim 2 1 Department of Statistics, Inha University,

More information

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail

Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial

More information

Implementation of Digital Contents System for Cleaning Facility management

Implementation of Digital Contents System for Cleaning Facility management , pp.126-130 http://dx.doi.org/10.14257/astl.2016.135.32 Implementation of Digital Contents System for Cleaning Facility management Byeongtae Ahn 1, 1 Division of Liberal Arts at Anyang University, Daeshin-Hall

More information

MR Cloud Managed Wireless Access Points

MR Cloud Managed Wireless Access Points Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise

More information

Research on Autonomic Control System Connection Goal-model and Fault-tree

Research on Autonomic Control System Connection Goal-model and Fault-tree , pp.47-53 http://dx.doi.org/10.14257/astl.2016.129.10 Research on Autonomic Control System Connection Goal-model and Fault-tree Dongbeom Ko 1, Teayoung Kim 1, Sungjoo Kang 2, Ingeol Chun 2, Jeongmin Park

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson

Assignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria

More information

Wireless Clients and Users Monitoring Overview

Wireless Clients and Users Monitoring Overview Wireless Clients and Users Monitoring Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT

More information

WatchGuard Technologies

WatchGuard Technologies 1 WatchGuard Technologies Andrés A. Buendía Ucrós Master Sales Engineer Caribbean & LatinAmerica 2 About WatchGuard Who We Are Mission: To bring widely deployable, enterprise-grade security to small and

More information

WLAN Security Overview

WLAN Security Overview WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless

More information

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS

SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;

More information

Client Computing Security Standard (CCSS)

Client Computing Security Standard (CCSS) Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices

More information

Alcatel-Lucent Wireless Solution COPYRIGHT 2011 ALCATEL-LUCENT ENTERPRISE. ALL RIGHTS RESERVED.

Alcatel-Lucent Wireless Solution COPYRIGHT 2011 ALCATEL-LUCENT ENTERPRISE. ALL RIGHTS RESERVED. Alcatel-Lucent Wireless Solution Delivering i Application Fluency AGENDA 1. Network Challenges 2. Realizing Mobility 3. Protect the Air 4. New Product Highlights 2 Product Portfolio at a Glance IP Address

More information

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN

More information

A Design of Authentication Protocol for a Limited Mobile Network Environment

A Design of Authentication Protocol for a Limited Mobile Network Environment Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.

More information

Common Service Discovery Scheme in IoT Environments

Common Service Discovery Scheme in IoT Environments , pp.28-32 http://dx.doi.org/10.14257/astl.2018.149.07 Common Service Discovery Scheme in IoT Environments Joosang Youn 1 * and TaeJin Lee 2 1 Dept. of Industrial ICT Engineering, Dong-Eui University 176,

More information

CND Exam Blueprint v2.0

CND Exam Blueprint v2.0 EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding

More information

A novel approach to detection of mobile rogue access points

A novel approach to detection of mobile rogue access points SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:1510 1516 Published online 3 April 2013 in Wiley Online Library (wileyonlinelibrary.com)..756 SPECIAL ISSUE PAPER A novel approach to

More information

Cisco NCS Overview. The Cisco Unified Network Solution CHAPTER

Cisco NCS Overview. The Cisco Unified Network Solution CHAPTER CHAPTER 1 This chapter describes the Cisco Unified Network Solution and the Cisco Prime Network Control System (NCS). It contains the following sections: The Cisco Unified Network Solution, page 1-1 About

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

2013 InterWorks, Page 1

2013 InterWorks, Page 1 2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations

More information

Wireless LAN Solutions

Wireless LAN Solutions Wireless LAN Solutions Juniper Networks delivers wireless solutions for enterprises of all sizes and types from small retail installations to the largest campuses Your JUNIPER NETWORKS dedicated Sales

More information

What is Eavedropping?

What is Eavedropping? WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks

More information

USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006

USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 Hyeyeon Kwon, Kyung-yul Cheon, Kwang-hyun Roh, Aesoon Park Electronics and Telecommunications Research Institute 161, Gajeong-dong,

More information

Aerohive and IntelliGO End-to-End Security for devices on your network

Aerohive and IntelliGO End-to-End Security for devices on your network Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture

More information

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017

RSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Airtight Management Console Last Modified: Thursday, May 04, 2017 Event Source Product Information: Vendor: AirTight Event Source: Airtight Management

More information

Study on design and implementation of web-based audience measurement platform for digital signage service

Study on design and implementation of web-based audience measurement platform for digital signage service ICACT Transactions on Advanced Communications Technology (TACT) Vol. 3, Issue 5, September 2014 505 Study on design and implementation of web-based audience measurement platform for digital signage service

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)

Ruckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points) Product Name: Manufacturer: - Model Number: 901-3450-UK00 Ruckus ZoneDirector 3450 supporting up to 500 ZoneFlex APs (901-3450-UK00) The Ruckus ZoneDirector 3450, The First Simple and Powerful Enterprise

More information

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Exam : Title : Security Solutions for Systems Engineers. Version : Demo Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized

More information

DATA SHEETS. 99 Washington Street Melrose, MA Phone Toll Free Visit us at

DATA SHEETS. 99 Washington Street Melrose, MA Phone Toll Free Visit us at DATA SHEETS Datasheet: AirMagnet Enterprise DATASHEET AME AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

2 University International Medical University

2 University International Medical University POLICY OWNER : Information Technology Services TITLE : Document Code : IMU/POL/ITS/09 Edition : 1 Approval Body : Management Approval : 03/05/17 Committee Date Effective Date : 03/05/17 Pages : 6 1.0 OBJECTIVE

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Implementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc.

Implementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc. Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control Daniel V. Hoffman m WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XIII XV Chapter 1 Chapter

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information