Sinha et al., 2006 - Google Patents
Wireless intrusion protection system using distributed collaborative intelligenceSinha et al., 2006
View PDF- Document ID
- 4903507750029299664
- Author
- Sinha A
- Haddad I
- Nightingale T
- Rushing R
- Thomas D
- Publication year
- Publication venue
- 2006 IEEE International Performance Computing and Communications Conference
External Links
Snippet
This paper describes the security threats associated with 802.11 based wireless local area networks (WLANs) and outlines a comprehensive architecture for a wireless intrusion protection system (WIPS). The AirDefense WIPS based on this architecture is currently used …
- 238000001514 detection method 0 description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
Bahl et al. | Enhancing the security of corporate Wi-Fi networks using DAIR | |
US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
Scarfone et al. | Guide to intrusion detection and prevention systems (idps) | |
US20030135762A1 (en) | Wireless networks security system | |
US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
US7710933B1 (en) | Method and system for classification of wireless devices in local area computer networks | |
Waliullah et al. | Wireless LAN security threats & vulnerabilities | |
US20040255167A1 (en) | Method and system for remote network security management | |
Aung et al. | Detection and mitigation of wireless link layer attacks | |
Sobh | Wi-Fi networks security and accessing control | |
Scarfone et al. | Sp 800-94. guide to intrusion detection and prevention systems (idps) | |
EP1522020B1 (en) | System for managing wireless network activity | |
Boob et al. | Wireless intrusion detection system | |
Ma et al. | RAP: Protecting commodity wi-fi networks from rogue access points | |
Tsakountakis et al. | Towards effective wireless intrusion detection in IEEE 802.11 i | |
Sinha et al. | Wireless intrusion protection system using distributed collaborative intelligence | |
Thakur et al. | RAPD algorithm: detection of rogue access point in wireless network | |
Tyagi et al. | A survey of different dos attacks on wireless network | |
Salasabi et al. | A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques | |
Poonkuntran et al. | Study of Honeypots: analysis of WiFi_Honeypots and Honeypots tools | |
Yevdokymenko et al. | Overview of the Course in “Wireless and Mobile Security” | |
Pap | Wireless LAN Security: What Hackers Know That You Don’t | |
Singh et al. | A Novel Architecture to Mitigate Wireless LAN based Phishing Attack | |
Villegas et al. | Analysis of tools for conducting Wireless Penetration Testing |