[go: up one dir, main page]

Boob et al., 2010 - Google Patents

Wireless intrusion detection system

Boob et al., 2010

View PDF
Document ID
9977607649100736652
Author
Boob S
Jadhav P
Publication year
Publication venue
International Journal of Computer Applications

External Links

Snippet

The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Karygiannis et al. Wireless Network Security:.
US7970894B1 (en) Method and system for monitoring of wireless devices in local area computer networks
US7961886B2 (en) Wireless perimeter security device and network using same
EP3422665B1 (en) Sensor-based wireless network vulnerability detection
KR20130004172A (en) Monitoring of smart mobile devices in the wireless access networks
US10498758B1 (en) Network sensor and method thereof for wireless network vulnerability detection
Boob et al. Wireless intrusion detection system
US10075850B2 (en) Method and system for wireless attack detection and mitigation
Baharudin et al. Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11
Guo Survey on WiFi infrastructure attacks
US9100429B2 (en) Apparatus for analyzing vulnerability of wireless local area network
Shourbaji et al. Wireless intrusion detection systems (WIDS)
VanSickle et al. Effectiveness of tools in identifying rogue access points on a wireless network
Efe et al. Wi-fi security analysis for E&M-Government applications
Sobh et al. Securing hybrid architecture of cloudlet computing in 5G networks enabling IoT and mobile wireless devices
Thakur et al. RAPD algorithm: detection of rogue access point in wireless network
KR102823857B1 (en) Location-based Wi-Fi firewall building system and method
Rofoo et al. DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks
Emeto et al. Security Vulnerabilities of Wlan Protocols: A Review
Diksha et al. Backdoor Intrusion in Wireless Networks-problems and solutions
Bhuiyan et al. Investigation on unauthorized human activity watching through leveraging Wi-Fi signals
Sinha et al. Wireless intrusion protection system using distributed collaborative intelligence
Athawale et al. Towards effective client-server based advent intrusion prevention system for WLAN
Zaman et al. Implementation of some enhancements in wireless network security by finding vulnerabilities, threats and attacks
Pattar Detection Of Rogue Access Points Present In The Wlan At The Server Side