參考文獻 |
[1] K. N. Gopinath. (2010) Be aware of 5 wi-fi security threats.
[Online]. Available: http://fanaticmedia.com/infosecurity/archive/Feb10/
5-Wireless-Security-Threats v2.htm
[2] L. Phifer. (2010) Top ten wi-fi security threats. [On-
line]. Available: http://www.esecurityplanet.com/views/article.php/3869221/
Top-Ten-WiFi-Security-Threats.htm
[3] Wikipedia. (2011) Rogue access point. [Online]. Available: http://en.wikipedia.org/
wiki/Rogue access point
[4] Wikipedia. (2012) Received signal strength indication. [Online]. Available:
http://en.wikipedia.org/wiki/Received Signal Strength Indication
[5] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and
practical solutions,” in USENIX Security Symposium, Auguest 2003.
[6] Cisco. (2007) Rogue detection under unified wireless networks. [On-
line]. Available: http://www.cisco.com/en/US/tech/tk722/tk809/technologies
white paper09186a0080722d8c.shtml
[7] The airmagnet project. [Online]. Available: http://www.airmagnet.com
[8] The netstumbler project. [Online]. Available: http://www.netstumbler.com
[9] Wisentry - wireless access point detection system. [Online]. Available: http:
//www.wimetrics.com/Products/WAPD.htm
[10] The inssider software. [Online]. Available: http://www.metageek.net/products/
inssider
[11] The airwave project. [Online]. Available: http://www.airwave.com
[12] Wavelink. [Online]. Available: http://www.wavelink.com
[13] Rogue access point detection: Automatically detect and manage wireless threats to
your network. [Online]. Available: http://www.proxim.com
[14] P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and
B. Zill, “Enhancing the security of corporate wi-fi networks using dair,” in
Proceedings of the 4th international conference on Mobile systems, applications and
services, ser. MobiSys ’06. New York, NY, USA: ACM, 2006, pp. 1–14. [Online].
Available: http://doi.acm.org/10.1145/1134680.1134682
[15] W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, “Passive online
rogue access point detection using sequential hypothesis testing with tcp ack-pairs,”
in Proceedings of the 7th ACM SIGCOMM conference on Internet measurement,
ser. IMC ’07. New York, NY, USA: ACM, 2007, pp. 365–378. [Online]. Available:
http://doi.acm.org/10.1145/1298306.1298357
[16] H. Yin, G. Chen, and J. Wang, “Detecting protected layer-3 rogue aps,” in Broad-
band Communications, Networks and Systems, 2007. BROADNETS 2007. Fourth
International Conference on, Sept. 2007, pp. 449 –458.
[17] W. Wei, B. Wang, C. Zhang, J. Kurose, and D. Towsley, “Classification of
access network types: Ethernet, wireless lan, adsl, cable modem or dialup?”
Comput. Netw., vol. 52, no. 17, pp. 3205–3217, Dec. 2008. [Online]. Available:
http://dx.doi.org/10.1016/j.comnet.2008.08.018
[18] S. Shetty, M. Song, and L. Ma, “Rogue access point detection by analyzing net-
work traffic characteristics,” in Military Communications Conference, 2007. MIL-
COM 2007. IEEE, Oct. 2007, pp. 1 –7.
[19] W. Wei, S. Jaiswal, J. Kurose, and D. Towsley, “Identifying 802.11 traffic from
passive measurements using iterative bayesian inference,” in INFOCOM 2006. 25th
IEEE International Conference on Computer Communications. Proceedings, April
2006, pp. 1 –12.
[20] V. Baiamonte, K. Papagiannaki, and G. Iannaccone, “Detecting 802.11 wireless hosts
from remote passive observations,” in Proceedings of the 6th international IFIP-TC6
conference on Ad Hoc and sensor networks, wireless networks, next generation
internet, ser. NETWORKING’07. Berlin, Heidelberg: Springer-Verlag, 2007, pp.
356–367. [Online]. Available: http://dl.acm.org/citation.cfm?id=1772322.1772361
[21] L. Watkins, R. Beyah, and C. Corbett, “A passive approach to rogue access point de-
tection,” in Global Telecommunications Conference, 2007. GLOBECOM ’07. IEEE,
Nov. 2007, pp. 355 –360.
[22] Y. Song, C. Yang, and G. Gu, “Who is peeping at your passwords at starbucks? – to
catch an evil twin access point,” in Dependable Systems and Networks (DSN), 2010
IEEE/IFIP International Conference on, 28 2010-July 1 2010, pp. 323 –332.
[23] S. Nikbakhsh, A. Manaf, M. Zamani, and M. Janbeglou, “A novel approach for rogue
access point detection on the client-side,” in Advanced Information Networking and
Applications Workshops (WAINA), 2012 26th International Conference on, March
2012, pp. 684 –687.
[24] Microsoft network monitor. [Online]. Available: http://support.microsoft.com/kb/
933741
[25] A. Panch and S. K. Singh, “A novel approach for evil twin or rogue ap mitigation in
wireless environment,” International Journal of Security and Its Applications, vol. 4,
no. 4, October 2010.
[26] Winpcap. [Online]. Available: http://www.winpcap.org
[27] Aircrack-ng. (2011) Determine the driver. [Online]. Avail-
able: http://www.aircrack-ng.org/doku.php?id=compatibility drivers&DokuWiki=
01c89160d88dc29d91c1546165ca8089#determine the driver
|