Threat Analysis of the Wireless Network Router Using STRIDE Threat Modeling 


Vol. 47,  No. 11, pp. 1788-1803, Nov.  2022
10.7840/kics.2022.47.11.1788


PDF
  Abstract

Due to the advantages and convenience of wireless networks, the use of wireless networks is rapidly increasing, and not only individuals, but also public institutions and businesses are providing wireless Wi-Fi services as essential services. As a result, attacks targeting wireless network routers are also increasing every year, and when vulnerabilities occur, enormous damage occurs. Because Wireless routers are easy to secure and access, attacks can occur without physical access. And the level of security protocols provided by wireless router products is different, so it is important to analyze vulnerabilities through threat analysis on wireless routers. In this paper, we created a data flow diagram (DFD) of a wireless network router, analyzed the data flow between the network router and Internet devices, and applied the STRIDE threat modeling technique to systematically identify threats. Additionally we applied the attack tree, and DREAD model to threats. Finally, a checklist for checking the security functions of the wireless network router is proposed to contribute to the improvement of the security of the wireless network router.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Related Articles
  Cite this article

[IEEE Style]

S. Kang, H. Cho, Y. Shin, K. Cho, "Threat Analysis of the Wireless Network Router Using STRIDE Threat Modeling," The Journal of Korean Institute of Communications and Information Sciences, vol. 47, no. 11, pp. 1788-1803, 2022. DOI: 10.7840/kics.2022.47.11.1788.

[ACM Style]

Su-jin Kang, Hyun-suk Cho, Young-seop Shin, and Kyu-tae Cho. 2022. Threat Analysis of the Wireless Network Router Using STRIDE Threat Modeling. The Journal of Korean Institute of Communications and Information Sciences, 47, 11, (2022), 1788-1803. DOI: 10.7840/kics.2022.47.11.1788.

[KICS Style]

Su-jin Kang, Hyun-suk Cho, Young-seop Shin, Kyu-tae Cho, "Threat Analysis of the Wireless Network Router Using STRIDE Threat Modeling," The Journal of Korean Institute of Communications and Information Sciences, vol. 47, no. 11, pp. 1788-1803, 11. 2022. (https://doi.org/10.7840/kics.2022.47.11.1788)