• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ½Ã±×´Ïó ±â¹ÝÀÇ ¹«¼± ħÀÔ Å½Áö ½Ã½ºÅÛ¿¡ °üÇÑ ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Study on Signature-based Wireless Intrusion Detection Systems
ÀúÀÚ(Author) ¹Ú»ó³ë   ±è¾Æ¿ë   Á¤È¸°æ   Sang-No Park   A-Yong Kim   Hoe-Kyung Jung  
¿ø¹®¼ö·Ïó(Citation) VOL 18 NO. 05 PP. 1122 ~ 1127 (2014. 05)
Çѱ۳»¿ë
(Korean Abstract)
¹«¼±·£Àº °æÁ¦¼º, À¯¿¬¼º, ¼³Ä¡ÀÇ ¿ëÀ̼º, ½º¸¶Æ® ±â±âÀÇ º¸±ÞÀ¸·Î ÀÎÇØ »ç¿ë°ú AP(Access Point)±¸ÃàÀÇ ´Ü¼øÈ­·Î »ç¹«½Ç, ¸ÅÀå, Çб³¿¡¼­ ½±°Ô Á¢ÇÒ ¼ö ÀÖ´Ù. ¹«¼±·£Àº °ø±â¸¦ Àü¼Û¸Åü·Î »ç¿ëÇϱ⠶§¹®¿¡ ÀüÆÄ°¡ µµ´ÞÇÏ´Â ¿µ¿ª¿¡¼­´Â º¸¾È À§Çù¿¡ Ç×»ó ³ëÃâÀÌ µÇ¸ç ºÒ¹ý AP ¼³Ä¡, Á¤Ã¥À§¹Ý AP, ÆÐŶ ¸ð´ÏÅ͸µ, AP ºÒ¹ý Á¢¼Ó, ¿ÜºÎ AP ¹× ¼­ºñ½º Á¢¼Ó, ¹«¼±³×Æ®¿öÅ© °øÀ¯, MAC ÁÖ¼Ò µµ¿ë µî »õ·Î¿î º¸¾È À§ÇùÀ» Áö´Ñ´Ù. º» ³í¹®¿¡¼­´Â ½Ã±×´Ïó ±â¹ÝÀÇ Snort¸¦ »ç¿ëÇÏ¿© ¹«¼± ħÀÔ Å½Áö ½Ã½ºÅÛ °³¹ß ¹æ¹ýÀ» Á¦¾ÈÇÑ´Ù. °ø°³µÈ ÇØÅ· ÅøÀ» »ç¿ëÇÏ¿© ¸ðÀÇ ÇØÅ·À» ½Ç½ÃÇÏ°í, Snort°¡ ÇØÅ· Åø¿¡ ÀÇÇÑ °ø°ÝÀ» ŽÁöÇÏ´ÂÁö ½ÇÇèÀ» ÅëÇÏ¿© ³í¹®ÀÇ ÀûÇÕ¼ºÀ» °ËÁõÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.
Å°¿öµå(Keyword) °øÅëÆò°¡±âÁØ   ¹éÆ®·¢   ½º³ëÆ®   ½Ã±×´Ïó   ħÀÔ Å½Áö ½Ã½ºÅÛ   Common Criteria   Backtrack   Snort   Signature   Intrusion Detection System  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå