A mobile device-based mobile AP detection scheme using NAT behavior
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, M. | - |
dc.contributor.author | Mun, J. | - |
dc.contributor.author | Jung, S. | - |
dc.contributor.author | Kim, Y. | - |
dc.date.available | 2019-04-10T10:34:50Z | - |
dc.date.created | 2018-04-17 | - |
dc.date.issued | 2013 | - |
dc.identifier.isbn | 9781479928453 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/32919 | - |
dc.description.abstract | This paper proposes the scheme to detect the Mobile AP from mobile devices independently without the help of additional nodes. The proposed scheme is for detecting the Mobile AP that does not have any security configuration which is highly likely to occur as the Rogue AP in real wireless network environment. The device inspects the NAT Behavior and Open Port at the time of specific AP connection to detect the presence of Mobile AP, and reduces the security threat for the Rogue AP. The Rogue AP detection scheme s presented previously are generally based on the detection of Rogue AP in the form of Evil Twin, and the Rogue AP of various forms cannot be detected easily with such techniques. In addition, such techniques require regular monitoring or additional network infrastructure, thus making it difficult to apply to mobile devices, and are not suitable in real public wireless network environment. The proposed technique enables detection of mobile AP, which does not have any security configuration, from mobile devices in public wireless network environment independently without the help of additional nodes, and therefore, represents the detection scheme that is easily applicable and proved its performance in the experiment under real wireless network environment. © 2013 IEEE. | - |
dc.relation.isPartOf | 2013 International Conference on IT Convergence and Security, ICITCS 2013 | - |
dc.title | A mobile device-based mobile AP detection scheme using NAT behavior | - |
dc.type | Conference | - |
dc.identifier.doi | 10.1109/ICITCS.2013.6717778 | - |
dc.type.rims | CONF | - |
dc.identifier.bibliographicCitation | 2013 3rd International Conference on IT Convergence and Security, ICITCS 2013 | - |
dc.description.journalClass | 2 | - |
dc.identifier.scopusid | 2-s2.0-84894143836 | - |
dc.citation.conferenceDate | 2013-12-16 | - |
dc.citation.conferencePlace | Macau | - |
dc.citation.title | 2013 3rd International Conference on IT Convergence and Security, ICITCS 2013 | - |
dc.contributor.affiliatedAuthor | Jung, S. | - |
dc.contributor.affiliatedAuthor | Kim, Y. | - |
dc.type.docType | Conference Paper | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.