A Mobile Device Classification Mechanism for Efficient Prevention of Wireless Intrusion
|
|
- Irma Chase
- 6 years ago
- Views:
Transcription
1 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion Hyeokchan Kwon 1, Sin-Hyo Kim 1, 1 Electronics and Telecommunications Research Institue, 218 Gajeong-ro, Yuseong-gu, Daejeon, KOREA {hckwon, shykim}@etri.re.kr Abstract. In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. Current wireless intrusion prevention system classifying the mobile s into three or four categories: authorized, unauthorized, guest and external. By contrast, the proposed mechanism classified mobile s into 9 categories. For a variety of classification, the proposed mechanism utilizes the -related real-time events from mobile management system and authorization system. This mechanism also provides the security policy generation steps for controlling mobile s access to s in the managed wireless network. The advantage of this mechanism against traditional approach is to identify and take countermeasure against -related potential security threats in advance. Keywords: wireless intrusion prevention, mobile management, mobile classification, wireless access control 1 Introduction Currently, there exist several Wireless Intrusion Prevention System (WIPS) product to detect and prevent wireless intrusion such as IT, DoS attack, rogue (access point)-based attack, unauthorized network access by the mobile and so on. WIPS consist of wireless threat management server that manages overall WLAN threat/security and wireless sensors that monitors radio frequency signals for the presence of rogue access point, unauthorized, unauthorized association, malicious traffic and so forth. Current WIPS classifying the mobile s into three or four categories: authorized, unauthorized, guest and external for preventing wireless intrusion. In case of AirTight [1], a representative wireless intrusion prevention system, classifying the mobile s into three categories: authorized, unauthorized and neighbor. In case of, they classified into three categories: authorized, rogue and external. Previous works on classification for preventing wireless intrusion have difficulty to subtle control the wireless access between mobile s to s because of its simple classification mechanism. And it cannot identify potential threats because its classification mechanism does not reflect the vulnerable state of the such as jailbreaking, rooting and so on. ISI 2013, ASTL Vol. 25, pp , 2013 SERSC
2 Proceedings, The 2nd International Conference on Information Science for Industry In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. The proposed mechanism classified mobile s into 9 categories. Each category can be combined, and the category (or combined category) will be mapped into security level which is defined in this mechanism to set-up the security policy for control accesses to managed. In order to make a variety of classification, we utilize the -related events from mobile management system (called D) and authorization system (called AS). The -related events include status of such as authentication, jailbroken, rooted, lost, misplaced, acting role (tethering/hot-spot), deletion of D agent illegally and so on. Currently, WIPS and D are individual products and each is independently deployed and operated. The related research on the WIPS mechanism by utilizing additional -related events from the D has also not yet been investigated. The contents organized as follows. In section 2, we present mobile classification mechanism. Finally, conclusion is given in section 3. 2 obile Device Classification echanism In this section, we present mobile classification mechanism in WIPS system. Fig. 1 shows the system architecture for classifying the mobile. In Fig. 1, wireless intrusion prevention server utilizes the -related events from mobile management system (called D) and authorization system (called AS). In this mechanism, D server provide WIPS with information such as jailbreaking/rooting, lost, misplaced, acting role (tethering/hot-spot), deletion of D agent illegally and so on. And the authentication server provides WIPS with the list of authorized. Policy DB Event DB classification Device classification Access policy Classification policy. Events from AS Events from D server I/F I/F Authorization Server (AS) WIPS Server D Server : D agent Fig. 1. The system architecture for classifying the mobile 318
3 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion The received events are stored in the event database in Fig. 1, and WIPS server classifying the mobile by analyzing the information in the event database, and the classification information is stored in the policy database. The Table 1 shows the list of -related event from authorization server and D server. Table 1. Device-related event from authorization server (AS) and D server Interface AS WIPS D Server WIPS Server Event List of authorized by the authorization server List of authorized by the D server (i.e., list of with D agent) Jailbroken/rooted, Lost/misplaced, Deletion of D agent illegally Act as a wireless access point by using wi-fi tethering or hotspot application Fig. 2 shows the classification of access point and mobile in this mechanism. We classified the mobile into 9 categories and access point into 5 categories. The detailed classification criteria are described in the Table 2. The classification criteria could be determined by the security policy. The WIPS server classifying the mobile by analyzing the information of the event database which contains the received -related information from authorized server and D server. This paper focuses on the classification of mobile only. From the 9 classification in Table 2, the classification of authorized (AS), authorized (D), risky and tethering can only be classified through the interworking with authentication server and/or D server. classification obile classification (AS) Tethering Rogue Tethering/Soft (anual) (D) External Black-list External Uncategorized Guest risky Uncategorized Fig. 2. Classification of obile and Access Point () Each category can be combined, and the category (or combined category) will be mapped into security level which is defined to set-up the security policy for control accesses to managed. The mapping with security level can be done by wireless network administrator. The higher number of security level means the higher security risk. 319
4 Proceedings, The 2nd International Conference on Information Science for Industry The follows is an example of security policy using combined category mapped with security level. The symbol &, means and, or respectively. (D) & Risky Tethering Security level 2 : A that is classified as authorized (D) and classified as risky or tethering is mapped into the security level 2. Table 2. The classification criteria of mobile Classification Classification Criteria (AS) by the authorization server (anual) The classified as authorized by the WIPS server itself manually beforehand (D) Guest Risky by D server (i.e., with valid D agent) The classified as guest by the WIPS server itself manually beforehand Jailbroken/rooted or Lost In case that, D agent installed in the is deleted illegally Tethering The act as a wireless access point by using wi-fi tethering or hotspot application External The not allowed by the wireless network administrator, but located on the outside of the managed physical domain (e.g., campus, building) and/or not connected with network segment to be protected. Black-list The listed in the blacklist Uncategorized Uncategorized WIPS self-detected information Device related event (from AS and D server) Classify mobile using classification algorithm Device classification ap the classification onto security level Security level Create an access control policy classification Fig. 3. Set-up an Access Control Policy In this mechanism, we defined four levels of access control: Permit (permit access), Prohibit (prohibit access), Inform (inform network administrator of connectivity information), Ignore (ignore the connectivity). The fundamental step to set up an access control policy is shown in Fig. 3. The access control policy in Fig.3 is created by network administrator, and it defines access control between security level and 320
5 A obile Device Classification echanism for Efficient Prevention of Wireless Intrusion classification. For example, the access control policy permit level_2 s to access authorized and prohibit level_3 s to access rogue and so on. 3 Conclusion In this paper, we present mobile classification mechanism for preventing wireless intrusion efficiently. Previous works on classification for preventing wireless intrusion have difficulty to subtle control the wireless communication between mobile s to s, because of its simple classification mechanism. And it cannot identify potential threats because its classification mechanism does not reflect the vulnerable state of itself such as jailbreaking, rooting and loss. In our mechanism, for a variety of classification, we utilize the related events from D and authorization system (called AS). In this approach, we can classify the mobile into 9 categories. To make security policy for preventing wireless intrusion the following steps are presented: (1) Classify mobile using classification algorithm (2) aps classification to security level (3) Create an access control policy using the security level and access point classification. The advantage of this approach is to identify and take countermeasure against -related potential security threats in advance. Such security threats could be arising from the which is jailbroken, rooted, loss and so on. Currently, we are planning to extend the classification mechanism to consider additional mobile related information such as -activity. Acknowledgement This research funded by the ISP (inistry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2013 References 1. AirTight: ethod and system for monitoring a selected region of an airspace associated with local area networks of computer s, Patent, AirTight, US 7,002,943 (2006) 2. R. Beyah, A. Venkataramen: Rogue-Access-Point Detection Challenges, Solutions, and Future Directions, IEEE Security & Privacy, vol. 9, issue 5, pp , IEEE (2011) 3. Tarek S. Sobh, Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art, vol. 28, issue 6, pp , Computer Standards & Interfaces, Elsevier (2006) 4. Anyclick AIR, UNETsystem 321
Complying with RBI Guidelines for Wi-Fi Vulnerabilities
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines
More informationWIDS Technology White Paper
Technical white paper WIDS Technology White Paper Table of contents Overview... 2 Background... 2 Functions... 2 Rogue detection implementation... 2 Concepts... 2 Operating mechanism... 2 Operating modes...
More informationMultipot: A More Potent Variant of Evil Twin
Multipot: A More Potent Variant of Evil Twin K. N. Gopinath Senior Wireless Security Researcher and Senior Engineering Manager AirTight Networks http://www.airtightnetworks.net Email: gopinath.kn@airtightnetworks.net
More informationHP0-Y39. Managing and Troubleshooting Enterprise Wireless Networks. Download Full Version :
HP HP0-Y39 Managing and Troubleshooting Enterprise Wireless Networks Download Full Version : https://killexams.com/pass4sure/exam-detail/hp0-y39 QUESTION: 37 RF Manager has determined that a Rogue access
More informationCisco Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version :
Cisco 300-375 Securing Cisco Wireless Enterprise Networks (WISECURE) Download Full Version : https://killexams.com/pass4sure/exam-detail/300-375 QUESTION: 42 Which two considerations must a network engineer
More informationStandard For IIUM Wireless Networking
INTERNATIONAL ISLAMIC UNIVERSITY MALAYSIA (IIUM) Document No : IIUM/ITD/ICTPOL/4.3 Effective Date : 13/11/2008 1.0 OBJECTIVE Standard For IIUM Wireless Networking Chapter : Network Status : APPROVED Version
More informationChapter 1 Describing Regulatory Compliance
[ 2 ] Chapter 1 Describing Regulatory Compliance Failure to secure a WLAN makes it vulnerable to attack. To properly secure your network, you must be able to identify common threats to wireless and know
More informationA Design of Building Group Management Service Framework for On-Going Commissioning
, pp.84-88 http://dx.doi.org/10.14257/astl.2014.49.18 A Design of Building Group Management Service Framework for On-Going Commissioning Taehyung Kim 1, Youn Kwae Jeong 1 and Il Woo Lee 1, 1 Electronics
More informationPRODUCT GUIDE Wireless Intrusion Prevention Systems
PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing
More informationSecuring Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS)
Securing Your Airspace with WatchGuard s Wireless Intrusion Prevention (WIPS) Introduction The proliferation of Wi-Fi across the globe has created an attractive opportunity for cyber attackers to snoop,
More informationLESSON 12: WI FI NETWORKS SECURITY
LESSON 12: WI FI NETWORKS SECURITY Raúl Siles raul@taddong.com Founder and Security Analyst at Taddong Introduction to Wi Fi Network Security Wireless networks or Wi Fi networks IEEE 802.11 Standards Information
More informationDesign and Implementation of Secure OTP Generation for IoT Devices
, pp.75-80 http://dx.doi.org/10.14257/astl.2017.146.15 Design and Implementation of Secure OTP Generation for IoT Devices Young-Sae Kim 1 and Jeong-Nyeo Kim 1 1 Electronics and Telecommunications Research
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationDetecting & Eliminating Rogue Access Point in IEEE WLAN
Detecting & Eliminating Rogue Access Point in IEEE 802.11 WLAN S.B.Vanjale, Amol K. Kadam, Pramod A. Jadhav Department of Computer Engg Bharati Vidyapeeth Deemed University College of Engineering Pune.
More information5 Tips to Fortify your Wireless Network
Article ID: 5035 5 Tips to Fortify your Wireless Network Objective Although Wi-Fi networks are convenient for you and your employees, there may be unwanted clients using up the bandwidth you pay for. In
More informationOptimized Wireless LAN Plan An AirTight Service. For
Optimized Wireless LAN Plan An AirTight Service For Sample Customer The Global Leader in Wireless Vulnerability Management AirTight Networks 339 N. Bernardo Avenue #200 Mountain View, CA 94043 www.airtightnetworks.com
More informationCyber Security Guidelines for Public Wi-Fi Networks
Cyber Security Guidelines for Public Wi-Fi Networks Version: 1.0 Author: Cyber Security Policy and Standards Document Classification: PUBLIC Published Date: April 2018 Document History: Version Description
More informationHP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS
HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS HP Networking Exam Preparation Guide HP0-Y27: DEPLOYING HP ENTERPRISE WIRELESS NETWORKS HP Networking Exam Preparation Guide Overview Requirements for
More informationWhat is a Wireless LAN? The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the tail in Ne
Introduction to Wireless Networking and Security Chino Information Technology Center Steve Siedschlag, Associate Professor What is a Wireless LAN? The wireless telegraph is not difficult to understand.
More informationWhat s New in ZoneFlex Software Release 9.4
What s New in ZoneFlex Software Release 9.4 This application note describes the new features available in Version 9.4 of the Ruckus Wireless ZoneFlex family. This document assumes familiarity with the
More informationA Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles
6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 146 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by
More informationMobile Security Fall 2013
Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop
More informationNetwork Intrusion Forensics System based on Collection and Preservation of Attack Evidence
, pp.354-359 http://dx.doi.org/10.14257/astl.2016.139.71 Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence Jong-Hyun Kim, Yangseo Choi, Joo-Young Lee, Sunoh Choi,
More informationA Virtual-Synchronized-File Based Privacy Protection System
Vol.133 (Information Technology and Computer Science 2016), pp.29-33 http://dx.doi.org/10.14257/astl.2016. A Virtual-Synchronized-File Based Privacy Protection System Hye-Lim Jeong 1, Ki-Woong Park 2 System
More informationSamsung Security AP WHITE PAPER
WHITE PAPER Introduction Due to their high speed and standardized features such as enhanced authentication and encryption, enterprise WLAN network systems are currently growing in their use as infrastructure
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationAirMagnet Enterprise DATASHEET
DATASHEET AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations to
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationFundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring
Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring Learning Objective Explain the importance of security audits, testing, and monitoring to effective security policy.
More informationExpected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy
CHAPTER 9 DEVELOPING NETWORK SECURITY STRATEGIES Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy Network Security Design
More informationCSA for Mobile Client Security
7 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including comprehensive endpoint security that is critical to
More informationSDN-Based Network Security Functions for VoIP and VoLTE Services
SDN-Based Network Security Functions for VoIP and VoLTE Services Daeyoung Hyun, Jinyoug Kim, Jaehoon (Paul) Jeong, Hyoungshick Kim, Jungsoo Park, and Taejin Ahn Department of Software, Sungkyunkwan University,
More informationSecuring Wireless LANs with Certificate Services
1 Securing Wireless LANs with Certificate Services PHILIP HUYNH University of Colorado at Colorado Springs Abstract Wireless Local Access Network (WLAN) is used popularly in almost everywhere from the
More informationQuickSpecs. Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor
Overview Models HP RF Manager Controller with 50-sensor License HP MSM415 RF Security Sensor J9521A J9522A Key features Full support for HP and 3rd party WLANs Automatic intrusion threat prevention Central
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationWHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis
WHY ARMIS Top 10 Reasons To Consider Armis 1. Comprehensive Asset Discovery and Inventory A complete inventory of hardware and software is critically important. This is why so many security frameworks,
More informationDetecting Protected Layer-3 Rogue APs
Detecting Protected Layer-3 Rogue APs Authors: Hongda Yin, Guanling Chen, and Jie Wang Department of Computer Science, University of Massachusetts Lowell Presenter: Bo Yan Department of Computer Science
More informationTDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1
, pp.40-46 http://dx.doi.org/10.14257/astl.2016.142.07 TDMA-Based Detection of Packet Modification Attacks in Wireless Sensor Networks 1 Hae Young Lee and Hyung-Jong Kim Department of Information Security
More informationConfiguring Security Solutions
3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Tab,
More informationThe Vulnerability Analysis and Improvement of the TETRA Authentication Protocol
The Vulnerability Analysis and Improvement of the TETRA Authentication Protocol Abstract The TETRA system provides an authentication service which permits only the authorized terminal to access its network
More informationEVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India
EVIL TWIN ACCESS POINT DETECTION AND PREVENTION IN WIRELESS NETWORK Sandip S. Thite Bharati Vidyapeeth s College of Engineering for Women, Pune, India Abstract Now a days wireless access points are widely
More informationWireless Network Security
Wireless Network Security Why wireless? Wifi, which is short for wireless fi something, allows your computer to connect to the Internet using magic. -Motel 6 commercial 2 but it comes at a price Wireless
More informationCisco ONE for Access Wireless
Data Sheet Cisco ONE for Access Wireless Cisco ONE Software helps customers purchase the right software capabilities to address their business needs. It helps deliver reduced complexity, simplified buying,
More informationCisco Unified Wireless Network Solution Overview
1 CHAPTER Unified Wireless Network Solution Overview This chapter summarizes the benefits and characteristics of the Unified Wireless Network for the enterprise.the Unified Wireless Network solution offers
More informationBasic Wireless Settings on the CVR100W VPN Router
Basic Wireless Settings on the CVR100W VPN Router Objective A Wireless Local Area Network (WLAN) utilizes radio communication to connect wireless devices to a LAN. An example is a Wi-Fi hotspot at a cafe.
More informationCS-MARS Integration for Cisco Unified Wireless
9 CHAPTER A secure unified network, featuring both wired and wireless access, requires an integrated, defense-in-depth approach to security, including cross-network anomaly detection and correlation that
More informationEC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led
EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,
More informationClassifying Rogue Access Points
Finding Feature Information, page 1 Information About, page 1 Restrictions for, page 4 How to Classify Rogue Access Points, page 5 Viewing and Classifying Rogue Devices (GUI), page 9 Examples:, page 11
More informationMulti-Layered Security Framework for Metro-Scale Wi-Fi Networks
Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks A Security Whitepaper January, 2004 Photo courtesy of NASA Image exchange. Image use in no way implies endorsement by NASA of any of the
More informationesight V300R001C10 WLAN Technical White Paper Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
V300R001C10 Issue 01 Date 2013-12-10 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written
More informationAirMagnet Enterprise DATA SHEETS PRINT
DATA SHEETS PRINT AirMagnet Enterprise AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that enables organizations
More informationSubject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer:
Section Number Section Header: Subject: Wireless Networking Policy Effective Date: May 2005 Responsible Office: Department of Information Technology _ Responsible Officer: TABLE OF CONTENTS Introduction...1
More informationOne Management Realized, with Cisco Prime Infrastructure Manage Complexity. Manage Effectively. Manage Intelligently. Closing
One Management Realized, with Cisco Prime Infrastructure Manage Complexity Manage Effectively Manage Intelligently Closing 2 2013 Cisco and/or its affiliates. All rights reserved. Internet of Things 99%
More informationClassifying Rogue Access Points
Finding Feature Information, page 1 Information About, page 1 Restrictions on, page 4 How to Classify Rogue Access Points, page 5 Viewing and Classifying Rogue Devices (GUI), page 10 Examples:, page 12
More informationRSA Ready Implementation Guide for
RSA Ready Implementation Guide for AirTight Networks SpectraGuard Enterprise (SGE) 6.7 Daniel R. Pintal, RSA Partner Engineering Last Modified: February 12, 2016 Solution
More informationCisco Exam Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ]
s@lm@n Cisco Exam 642-737 Implementing Advanced Cisco Unified Wireless Security v2.0 Version: 9.0 [ Total Questions: 206 ] Cisco 642-737 : Practice Test Question No : 1 RADIUS is set up with multiple servers
More informationIdentity and Client Security for Remote Access Virtual Credential Container
Identity and Client Security for Remote Access Virtual Credential Container Yukio Tsuruoka NTT Information Sharing Platform Laboratories Contents About NTT Background Outline Client security Use case:
More informationA Load Balancing Scheme for Games in Wireless Sensor Networks
, pp.89-94 http://dx.doi.org/10.14257/astl.2013.42.21 A Load Balancing Scheme for Games in Wireless Sensor Networks Hye-Young Kim 1 1 Major in Game Software, School of Games, Hongik University, Chungnam,
More informationConfiguring Security Solutions
3 CHAPTER This chapter describes the security solutions for wireless LANs. It contains the following sections: Cisco Unified Wireless Network Solution Security, page 3-1 Interpreting the Security Dashboard,
More informationRequirements for the Operations & Management of 4G Networks
Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering
More informationRequirements for Building Effective Government WLANs
White Paper Government Requirements for Building Effective Government WLANs CJ Mathias Farpoint Group Introduction With governments just now beginning the adoption of wireless LANs as a key component of
More informationCOPYRIGHTED MATERIAL. Contents
Contents Foreword Introduction xxv xxvii Assessment Test xxxviii Chapter 1 WLAN Security Overview 1 Standards Organizations 3 International Organization for Standardization (ISO) 3 Institute of Electrical
More informationSystematic Security Checking on OSGi Bundles for Remote Healthcare System
, pp.1-5 http://dx.doi.org/10.14257/astl.2015.116.01 Systematic Security Checking on OSGi Bundles for Remote Healthcare System Jinsoo Hwang 1, Kichang Kim 2 1 Department of Statistics, Inha University,
More informationMotorola AirDefense Retail Solutions Wireless Security Solutions For Retail
Motorola AirDefense Retail Solutions Wireless Security Solutions For Retail Wireless Risks in Retail The PCI Security Standards Council is an open global forum, founded by American Express, Discover Financial
More informationImplementation of Digital Contents System for Cleaning Facility management
, pp.126-130 http://dx.doi.org/10.14257/astl.2016.135.32 Implementation of Digital Contents System for Cleaning Facility management Byeongtae Ahn 1, 1 Division of Liberal Arts at Anyang University, Daeshin-Hall
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationResearch on Autonomic Control System Connection Goal-model and Fault-tree
, pp.47-53 http://dx.doi.org/10.14257/astl.2016.129.10 Research on Autonomic Control System Connection Goal-model and Fault-tree Dongbeom Ko 1, Teayoung Kim 1, Sungjoo Kang 2, Ingeol Chun 2, Jeongmin Park
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationAssignment Project Whitepaper ITEC495-V1WW. Instructor: Wayne Smith. Jim Patterson
Project Whitepaper ITEC495-V1WW Instructor: Wayne Smith Jim Patterson Table of Contents 1. Abstract Page 3 2. Introduction Page 3 3. Analysis Page 4 4. Solution Discussion Page 7 5. Evaluation Criteria
More informationWireless Clients and Users Monitoring Overview
Wireless Clients and Users Monitoring Overview Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
More informationWatchGuard Technologies
1 WatchGuard Technologies Andrés A. Buendía Ucrós Master Sales Engineer Caribbean & LatinAmerica 2 About WatchGuard Who We Are Mission: To bring widely deployable, enterprise-grade security to small and
More informationWLAN Security Overview
WLAN Security Overview This Chapter Explore the basic terminology of WLAN security. Discuss the organizations that create the standards, certifications, and recommendations that help guide and direct wireless
More informationSYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS
SYSTEM THREAT ANALYSIS FOR HIGH ASSURANCE SOFTWARE DEFINED RADIOS David Murotake, (SCA Technica, Inc. Nashua NH, USA; david.murotak@scatechnica.com) Antonio Martin (SCA Technica, Inc., Nashua NH, USA;
More informationClient Computing Security Standard (CCSS)
Client Computing Security Standard (CCSS) 1. Background The purpose of the Client Computing Security Standard (CCSS) is to (a) help protect each user s device from harm, (b) to protect other users devices
More informationAlcatel-Lucent Wireless Solution COPYRIGHT 2011 ALCATEL-LUCENT ENTERPRISE. ALL RIGHTS RESERVED.
Alcatel-Lucent Wireless Solution Delivering i Application Fluency AGENDA 1. Network Challenges 2. Realizing Mobility 3. Protect the Air 4. New Product Highlights 2 Product Portfolio at a Glance IP Address
More informationInformation Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards
COUNTY OF SACRAMENTO Inter-Departmental Correspondence December 6, 2007 TO: FROM: Information Technology Policy Board Members Jeff Leveroni, Chair Technology Review Group SUBJECT: Update to County WAN/LAN
More informationA Design of Authentication Protocol for a Limited Mobile Network Environment
Vol.29 (SecTech 2013), pp.41-45 http://dx.doi.org/10.14257/astl.2013.29.08 A Design of Authentication Protocol for a Limited Mobile Network Environment Minha Park 1,1, Yeog Kim 2, Okyeon Yi 3 1, 3 Dept.
More informationCommon Service Discovery Scheme in IoT Environments
, pp.28-32 http://dx.doi.org/10.14257/astl.2018.149.07 Common Service Discovery Scheme in IoT Environments Joosang Youn 1 * and TaeJin Lee 2 1 Dept. of Industrial ICT Engineering, Dong-Eui University 176,
More informationCND Exam Blueprint v2.0
EC-Council C ND Certified Network Defende r CND Exam Blueprint v2.0 CND Exam Blueprint v2.0 1 Domains Objectives Weightage Number of Questions 1. Computer Network and Defense Fundamentals Understanding
More informationA novel approach to detection of mobile rogue access points
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 2014; 7:1510 1516 Published online 3 April 2013 in Wiley Online Library (wileyonlinelibrary.com)..756 SPECIAL ISSUE PAPER A novel approach to
More informationCisco NCS Overview. The Cisco Unified Network Solution CHAPTER
CHAPTER 1 This chapter describes the Cisco Unified Network Solution and the Cisco Prime Network Control System (NCS). It contains the following sections: The Cisco Unified Network Solution, page 1-1 About
More informationSymantec Endpoint Protection Family Feature Comparison
Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per
More information2013 InterWorks, Page 1
2013 InterWorks, Page 1 The BYOD Phenomenon 68% of devices used by information workers to access business applications are ones they own themselves, including laptops, smartphones, and tablets. IT organizations
More informationWireless LAN Solutions
Wireless LAN Solutions Juniper Networks delivers wireless solutions for enterprises of all sizes and types from small retail installations to the largest campuses Your JUNIPER NETWORKS dedicated Sales
More informationWhat is Eavedropping?
WLAN Security What is Eavedropping? War Driving War Driving refers to someone driving around with a laptop and an 802.11 client card looking for an 802.11 system to exploit. War Walking Someone walks
More informationUSIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006
USIM based Authentication Test-bed For UMTS-WLAN Handover 25 April, 2006 Hyeyeon Kwon, Kyung-yul Cheon, Kwang-hyun Roh, Aesoon Park Electronics and Telecommunications Research Institute 161, Gajeong-dong,
More informationAerohive and IntelliGO End-to-End Security for devices on your network
Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture
More informationRSA NetWitness Logs. Airtight Management Console. Event Source Log Configuration Guide. Last Modified: Thursday, May 04, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Airtight Management Console Last Modified: Thursday, May 04, 2017 Event Source Product Information: Vendor: AirTight Event Source: Airtight Management
More informationStudy on design and implementation of web-based audience measurement platform for digital signage service
ICACT Transactions on Advanced Communications Technology (TACT) Vol. 3, Issue 5, September 2014 505 Study on design and implementation of web-based audience measurement platform for digital signage service
More informationThe following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
More informationRuckus ZoneDirector 3450 WLAN Controller (up to 500 ZoneFlex Access Points)
Product Name: Manufacturer: - Model Number: 901-3450-UK00 Ruckus ZoneDirector 3450 supporting up to 500 ZoneFlex APs (901-3450-UK00) The Ruckus ZoneDirector 3450, The First Simple and Powerful Enterprise
More informationExam : Title : Security Solutions for Systems Engineers. Version : Demo
Exam : 642-566 Title : Security Solutions for Systems Engineers Version : Demo 1. Which one of the following elements is essential to perform events analysis and correlation? A. implementation of a centralized
More informationDATA SHEETS. 99 Washington Street Melrose, MA Phone Toll Free Visit us at
DATA SHEETS Datasheet: AirMagnet Enterprise DATASHEET AME AirMagnet Enterprise is a comprehensive 24x7 Performance Monitoring & Wireless Intrusion Detection system (WIDS) / Prevention System (WIPS), that
More informationSecure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements
Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users
More informationWireless Network Security Fundamentals and Technologies
Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology
More information2 University International Medical University
POLICY OWNER : Information Technology Services TITLE : Document Code : IMU/POL/ITS/09 Edition : 1 Approval Body : Management Approval : 03/05/17 Committee Date Effective Date : 03/05/17 Pages : 6 1.0 OBJECTIVE
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage
More informationChapter 24 Wireless Network Security
Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically
More informationImplementing. Security Technologies. NAP and NAC. The Complete Guide to Network Access Control. Daniel V. Hoffman. WILEY Wiley Publishing, Inc.
Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control Daniel V. Hoffman m WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XIII XV Chapter 1 Chapter
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More information