Specification-Based Intrusion Detection System for WiBro
详细信息    查看全文
  • 作者:Yunho Lee (1) cyberkma@gmail.com
    Sang-Guun Yoo (2)
    Juho Kim (2)
    Soojin Lee (1)
  • 关键词:WiBro – ; Information security – ; Intrusion detection – ; Specification
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2011
  • 出版时间:2011
  • 年:2011
  • 卷:6935
  • 期:1
  • 页码:445-455
  • 全文大小:391.8 KB
  • 参考文献:1. Airspan, Mobile WiMAX security, Airspan Networks Inc. (2007), http://www.airspan.com
    2. Yuksel, E.: Analysis of the PKMv2 Protocol in IEEE 802.16e-2005 Using Static Analysis Informatics and Mathematical Modeling, TUD (2007), http://www2.imm.dtu.dk/pubdb/views/publication_details.php?id=5159
    3. Porras, P., Kemmerer, R.: Penetration State Transition Analysis: A Rule based Intrusion Detection Approach. In: Eighth Annual Computer Security Applications Conference (1992)
    4. Kumar, S., Spafford, E.: A Pattern-Matching Model for Intrusion Detection. In: Nat’l Computer Security Conference (1994)
    5. Anderson, D., Lunt, T., Javitz, H., Tamaru, A., Valdes, A.: Next-generation Intrusion Detection Expert System (NIDES): A Summary, SRI-CSL-95-07, SRI International (1995)
    6. Forrest, S., Hofmeyr, S., Somayaji, A.: Computer Immunology. Comm. of ACM 40(10) (1997)
    7. Ghosh, A., Schwartzbard, A., Schatz, M.: Learning Program Behavior Profiles for Intrusion Detection. In: 1st USENIX Workshop on Intrusion Detection and Network Monitoring (1999)
    8. Ko, C., Ruschitzka, M., Levitt, K.: Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. In: IEEE Symposium on Security and Privacy (1997)
    9. Sekar, R., Uppuluri, P.: Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications. In: USENIX Security Symposium (1999)
    10. Tseng, C., et al.: A Specification-based Intrusion Detection System for AODV. In: 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2003 (2003)
    11. Gill, R., Smith, J., Clark, A.: Specification-Based Intrusion Detection in WLANs. In: Proceedings of the 22nd Annual Computer Security Application Conference, pp. 141–152 (2006)
    12. Extensible Authentication Protocol (EAP), RFC3748 (2004)
    13. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA), RFC4187 (2006)
    14. Barbeau, M.: WiMax/802.16 Threat Analysis. In: Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, pp. 8–15 (2005)
  • 作者单位:1. Korea National Defense University, Seoul, Korea2. Department of Computer Science and Engineering, Sogang University, Seoul, Korea
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
文摘
WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wireless broadband Internet technology developed by the South Korean telecommunications industry. In this paper, we analyze security vulnerabilities of the WiBro standard, focusing on the initial authentication phase and propose a specification-based intrusion detection system that can detect those vulnerabilities. We first derive specifications from the normal operational process of the initial authentication based on PKMv2 EAP-AKA and formalize the derived specifications as a state transition diagram. The proposed system executes the intrusion detection based on those specifications and the state transition diagram. In this paper, to verify the detection capability of the proposed system, we construct an experimental network and execute scenario-based tests.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.