...
首页> 外文期刊>IEEE transactions on network and service management >Leveraging SDN and WebRTC for Rogue Access Point Security
【24h】

Leveraging SDN and WebRTC for Rogue Access Point Security

机译:利用SDN和WebRTC增强Rogue接入点安全性

获取原文
获取原文并翻译 | 示例
           

摘要

Rogue access points (RAPs) are unauthorized devices connected to a network, providing unauthorized wireless access to one or more clients. Such devices pose significant risk to organizations, since they provide a convenient means for hackers and insiders to hide malicious or unsanctioned activities on industry, government, and campus networks. Yet, limitations inherent in traditional networks make detecting and removing such devices expensive, time consuming, and difficult to implement. For software-defined networks (SDNs), the risk of a network compromise due to RAPs is equally concerning, and methods for detecting RAPs within SDN architectures are needed. Hence, this paper leverages the capabilities of an SDN along with a trusted agent to detect and deny RAPs access to networks by using both generic and novel methods with minimal impact to performance. Three other contributions are included in this paper. They include: 1) utilizing an emerging Web architecture to detect hidden subnets; 2) developing the first, security-based, use case for Mininet-WiFi, a software-defined wireless network emulator; and 3) enhancing Ryuretic, a modular programming language for SDN application development.
机译:恶意访问点(RAP)是连接到网络的未授权设备,向一个或多个客户端提供未授权的无线访问。此类设备对组织构成了重大风险,因为它们为黑客和内部人员提供了一种便捷的手段,使其可以隐藏行业,政府和园区网络上的恶意或未经批准的活动。然而,传统网络固有的局限性使得检测和移除这种设备昂贵,费时且难以实施。对于软件定义网络(SDN),由RAP引起的网络危害风险同样值得关注,并且需要用于检测SDN体系结构中RAP的方法。因此,本文利用SDN的功能以及受信任的代理,通过使用对性能影响最小的通用方法和新颖方法来检测和拒绝RAP对网络的访问。本文还包括其他三个方面。它们包括:1)利用新兴的Web体系结构检测隐藏的子网; 2)为Mininet-WiFi(软件定义的无线网络仿真器)开发第一个基于安全性的用例; 3)增强Ryuretic(一种用于SDN应用程序开发的模块化编程语言)。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号