• 沒有找到結果。

F UTURE R ESEARCH D IRECTIONS

Nevertheless, wireless honeypot is still in its infancy, much effort should be invested. For instance, further research should focus on performance, cross-platform issue and multiple standard supports including the latest IEEE 802.11a.

Several modules of WIPS still require further elaboration. For example, it is possible to extend intrusion detection module’s function by incorporating known signatures from other IDS. Also, installing simulation of client interactions or services may improve honeypot’s attraction to the hacker. Presently, the proposed system has been only tested on Linux platform. Further research should consider implement a cross-platform system in the future.

REFERENCES

1. Borisov, N., Goldberg, I., and Wagner, D. (2001) ‘Intercepting mobile communications: The insecurity of 802.11’, in the Annual International Conference on Mobile Computing and Networking, pp. 180 188

2. Fluhrer,S., Mantin, I. and Shamir, A. (2001) “Weaknesses in the key scheduling algorithm of RC4”, in the Eighth Annual Workshop on Selected Areas in Cryptography, pp. 33 35

3. Faria, D. B., Cheriton, D. R. “DoS and authentication in wireless public access networks” in the Workshop on Wireless Security, 2002, pp. 47 56

4. Stubblefield, A., Ioannidis, J., and Rubin, A. D. (2004) ‘A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)’, ACM Transactions on Information and System Security, Vol. 7, No. 2, pp. 319 332.

5. Berghel, H, Uecker, J. (2004) ‘Wireless infidelity II: Airjacking’ Communications of the ACM, Vol. 47, no. 12, pp. 15 20.

6. Yang, H., Xie L., and Sun, J. (2004) ‘Intrusion detection for wireless local area network’, in the 2004 Canadian Conference on Electrical and Computer

Engineering, pp. 1949 1952.

7. Lim, Y.-X., Yer, T.S., Levine, J., Owen, H.L., (2003) ‘Wireless intrusion detection and response’, in the Information Assurance Workshop of IEEE Systems, Man and Cybernetics Society, pp. 68 75.

8. Schmoyer, T.R., Yu Xi Lim, Owen, H.L. (2004) ‘Wireless intrusion detection and response: a classic study using main-in-the-middle attack’, in the IEEE Wireless Communications and Networking Conference, pp. 883 888.

9. Yang . H., Xie L., Sun, J. (2004) ‘Intrusion detection solution to WLANs’, in the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication, pp. 553 556

10. Ren, Q., Liang Q. (2004) ‘Secure media access control (MAC) in wireless sensor networks: intrusion detections and countermeasures’, in the 15th IEEE

International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 3025 – 3029.

11. Chandran, N. and Sampath, D. (2004) ‘Strengthening WEP protocol for wireless networks using block chaining algorithm with variable encrypting function mechanism’, in 2004 IEEE Sarnoff Symposium on Advances in Wired and Wireless Communication, pp. 141 143.

12. Welch, D. and Lathrop, S. (2003) ‘Wireless security threat taxonomy’, in 2003.

IEEE Systems, Man and Cybernetics Society, pp. 76 83.

13. Ding, P.Q., Holliday J.N, and Celik A. (2004) ‘Improving the security of wireless LANs by managing 802.1x disassociation’, in First IEEE Consumer

Communications and Networking Conference, pp. 53 58.

14. Wang, S., Tao R., Wang, Y. and Zhang, J. (2003) ‘WLAN and it's security problem’, the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. :241 244.

15. Carli, M., Rosetti, A., and Neri, A. (2003) ’ Integrated security architecture for WLAN’, in the 10th International Conference on Telecommunications, pp. 943 947/

16. Barken, L. (2003) ‘WEP vulnerabilities: Wired equivalent privacy?’, Computer Security Journal, Vol. 19, No, 3, pp. 31 36.

17. Goth, G. (2003) ‘Will the white house take on Wi-Fi?’, IEEE Distributed Systems Online, Vol. 4, No. 2, 7p

18. Potter, B. (2003) ‘Wireless security's future’, IEEE Security and Privacy, Vol. 1, no. 4, pp. 68 72.

19. Bakirdan, A., Qaddour, J., Jalozie, I.K. (2003) ‘Security Algorithms in Wireless LAN: Proprietary or Non-Proprietary’, in the 2003 IEEE Global

Telecommunications Conference, pp. 1425 1429.

20. Varshnez, U., Malloy, A., Ahluwalia, P., and Jain, R. (2004) ‘Wireless in the enterprise: requirements, solutions and research directions’, Int. J. Mobile Communications, Vol. 2, No. 4, pp.354 367.

21. Abuelyaman, E. and Wen, H.J. (2004) ‘An efficient wireless transmission method for m-commerce’, Int. J. Mobile Communications, Vol. 2, No. 4, pp.405 417.

22. Maunuksela, A. J. and Nieminen M. (2005) ‘Micromobility supported WLAN networks: an empirical study of new IP protocol to support mobility and

connection handovers’, Int. J. Mobile Communications, Vol. 3, No. 4, pp.127 137

23. Tsaur, W. J. and Ho, C. H. (2005) ‘A mobile agent protected scheme using pairing-based cryptosystems’, Int. J. Mobile Communications, Vol. 3, No. 4, pp.183 196

24. Lu, J., Yu, C.S., Liu, C. and Ku, C. Y.F. (2004) ‘Wireless trust: conceptual and operational definition’, Int. J. Mobile Communications, Vol. 2, No. 1, pp.38 50 25. Lu, J., Hayes, L.A., Yu, C.S. and Liu, C. (2003) ‘Conceptual and operational

definition of system complexity in the domain of Wireless Internet via Mobile Technology’, Int. J. Mobile Communications, Vol. 1, No. 1, pp.360 371

26. Banitsas, K. A., Song, Y.H., and Owens, T. J. (2004) ‘OFDM over IEEE 802.11b hardware for telemedical applications’, Int. J. Mobile Communications, Vol. 2, No.

3, pp.310 327

27. Jamshaid, K., You, L. (2003) ‘Performance evaluation of technologies for securing 802.11 Enterprise wireless networks’, in the International Conference on

Communication, Network, and Information Security, pp. 15 19.

28. Adelstein, F., Alla, P., Joyce, R., Richard III, G. (2004) ‘Physically locating wireless intruders’, in the International Conference on Information Technology:

Coding Computing, pp. 482 489.

29. Virendra, M., Upadhyaya, S., (2004) ‘SWAN: a secure wireless LAN architecture’, in the 29th Annual IEEE International Conference on Local Computer Networks, pp. 216 223.

30. Flickenger, R. (2003) ‘Building Community Networks’, OReilly & Associates Inc.

31. Raynal, F., Berthier, Y., Biondi, P., Kaminsky, D, (2004) ‘Honeypot forensics part 1: analyzing the network’ IEEE Security & Privacy Magazine , Vol. 2, no. 4, pp.

72 78.

32. Raynal, F., Berthier, Y., Biondi, P., Kaminsky, D, (2004) ‘Honeypot forensics part II: analyzing the compromised host’ IEEE Security & Privacy Magazine , Vol. 2, no. 5, pp. 77 80.

33. Raynal, F., Berthier, Y., Biondi, P., Kaminsky, D, (2004) ‘Honeypot forensics’ in the the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, pp. 22 29.

34. Borsc M, Shinde H. (2005) ‘Wireless security & privacy’ in the 2005 IEEE International Conference on Personal Wireless Communications, pp.424 428.

35. Peltier, J. (2005) ‘Testing wireless security cryptosystems for speed’, Computer Security Journal, Vol. 2, no. 1, pp. 1 20.

36. Sharp, Kevin R. (2005) ‘Wireless security and management’, Supply Chain Systems Magazine, Vol. 25, no. 4, pp. 32 34.

37. Chen, J. C., Jiang, M. C., Liu, Y. W. (2005) ‘Wireless LAN security and IEEE 802.11i’, IEEE Wireless Communications, Vol. 12, no. 1, pp. 27 36.

38. Carr, J.(2005) ‘Configuring wireless security’ Network Magazine, Vol. 20, no. 2, pp. 58 60.

39. Wu, L., Shi, L. (2005) ‘Construction of security wireless LAN based on VPN’

Jisuanji Gongcheng/Computer Engineering, Vol. 31, no. 4, pp. 169 171.

40. Held, G. (2005) ‘Focus on firetide HotPoint wireless mesh routers’ International Journal of Network Management, Vol. 15, no. 1, pp. 67 71

41. Beyah, R., Kangude, S., Yu, G., Strickland, B., Copeland, J. (2004) ‘Rogue access point detection using temporal traffic characteristics’ in the IEEE Global

Telecommunications Conference, Vol. 4, pp. 2271-2275

42. Jagetia, M., Kocak, T. (2004) ‘ A novel scrambling algorithm for a robust WEP implementation’ in the IEEE 59th Vehicular Technology Conference, Vol. 59, no.

5, pp. 2487 2491

43. Sorman, M., Kovac, T., Maurovic, D. (2004) ‘Implementing improved WLAN security’ in the 46th International Symposium Electronics in Marine, pp. 229 234.

44. Mishra, A. Petroni Jr., Nick L.; Arbaugh, W. A., Fraser, T. (2004) “Security issues in IEEE 802.11 wireless local area networks: A survey” Wireless Communications and Mobile Computing, Vol. 4, no. 8, pp. 821 833.

45. Diaz, J. A. P., Del Valle Torres, G. (2004) ‘Vulnerabilities in 802.11b wireless local area networks’ in the International Conference on Security and Management, pp. 118 124.

46. Larson, M. (2004) ‘The SecureScout Wi-Fi security and monitoring framework’

Dr. Dobb's Journal, Vol. 29, no. 11, pp. 34 39.

47. Namadurai, E., Qaddour, J., Doss, D. (2004) ‘Wireless LAN: Security problems, solutions and challenges’, in the 5th World Wireless Congress, pp. 719 722.

48. Ahuja, S. P., Dendukuri, K. (2004) ‘Security problems in 802.11 based wireless networks’ in the Third IASTED International Conference on Communications, Internet, and Information Technology, pp. 195-200.

49. Boland, H., Mousavi, H. (2004) ‘Security issues of the IEEE 802.11B wireless LAN’ in the Canadian Conference on Electrical and Computer Engineering, Vol. 1, pp. 0333 0336.

50. Erten, Y. M., Tomur, E. (2004) ‘A layered security architecture for corporate 802.11 wireless networks’ in the 2004 Wireless Telecommunications Symposium, pp. 123 128.

51. Karir, M., Baras, J. S. (2004) ‘Data dependent keying for wireless networks’ in the 2003 IEEE 58th Vehicular Technology Conference, Vol. 58, no. 3, pp. 2098 2102.

52. Yan, H., He, C. (2004) ‘Security analysis and improvement of wired equivalent privacy’ Journal of Shanghai Jiaotong University, Vol. 38, no. 5, pp.

693-696+700

53. Chandran, N., Sampath, D. (2004) ‘Strengthening WEP protocol for wireless networks using block chaining algorithm with variable encrypting function mechanism’ in the IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, pp. 141 143.

54. Ding, P, Holliday, J., Celik, A. (2004) ‘Improving the security of Wireless LANs by managing 802.1x disassociation’ in the 2004 IEEE Consumer Communications and Networking Conference, pp. 53 58.

55. Komori, T., Saito, T., (2004) ‘A secure wireless LAN system retaining privacy’ in the 18th International Conference on Advanced Information Networking and Applications, Vol.2 , pp.370 375 .

56. Cheung, D. (2004) ‘WLAN security and Wi-Fi protected access’ Dr. Dobb's Journal, Vol. 29, no. 6, pp. 45 47.

57. Majstor, F.; (2003) ‘WLAN security threats & solutions’ in the 28th Annual IEEE International Conference on Local Computer Networks, pp. 650.

58. Potter, B. (2003) ‘Wireless security's future’ IEEE Security and Privacy, Vol. 1, no.

4, pp. 68 72.

59. Goth, G. (2003) ‘Will the white house take on Wi-Fi?’ IEEE Distributed Systems Online, Vol. 4, no. 2, 7p.

60. Jha, N., Sengupta,I. (2003) ‘A new scheme to improve the security of the WEP protocol’ in the Intl. Conference on Communication, Network and Information Security , pp.1 6.

61. Cam-Winget, N., Housley, R., Wagner, D., Walker, J. (2003) ‘Security flaws in 802.11 data link protocols’ Communications of the ACM, Vol. 46, no. 5, pp. 35 39.

62. Salgarelli, L., Buddhikot, M., Garay, J., Patel, S., Miller, S. (2003) ‘Emerging authentication and key distribution in wireless IP networks’ IEEE Wireless Communications, Vol. 10, no. 6,pp. 52 61.

63. Bakirdan, A., Qaddour, J., Jalozie, I.K., (2003) ‘Security algorithms in wireless LAN: proprietary or nonproprietary’ in the IEEE Global Telecommunications Conference, Vol. 3, pp.1425 1429.

64. Potter, B. (2004) ‘Fixing wireless security’ Network Security, Vol.4, no.6, pp. 4 5.

65. Zahariadis, T. (2004) ‘Evolution of the Wireless PAN and LAN standards’

Computer Standards and Interfaces, Vol. 26, no. 3, pp. 175 185.

66. Hassan, H.R., Challal, Y. (2005) ‘Enhanced WEP: an efficient solution to WEP threats’ in the Second IFIP International Conference on Wireless and Optical Communications Networks, pp. 594 599

67. Chandran, N., Bhavana, K.R., (2005) ‘ Enhancing RC4 algorithm for WEP protocol using fake character insertions and compression technique (FCICT)’ in the Second IFIP International Conference on Wireless and Optical

Communications Networks, pp. 80 83.

相關文件