Boob et al., 2010 - Google Patents
Wireless intrusion detection systemBoob et al., 2010
View PDF- Document ID
- 9977607649100736652
- Author
- Boob S
- Jadhav P
- Publication year
- Publication venue
- International Journal of Computer Applications
External Links
Snippet
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. The recent denial of service attacks on major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Karygiannis et al. | Wireless Network Security:. | |
| US7970894B1 (en) | Method and system for monitoring of wireless devices in local area computer networks | |
| US7961886B2 (en) | Wireless perimeter security device and network using same | |
| EP3422665B1 (en) | Sensor-based wireless network vulnerability detection | |
| KR20130004172A (en) | Monitoring of smart mobile devices in the wireless access networks | |
| US10498758B1 (en) | Network sensor and method thereof for wireless network vulnerability detection | |
| Boob et al. | Wireless intrusion detection system | |
| US10075850B2 (en) | Method and system for wireless attack detection and mitigation | |
| Baharudin et al. | Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11 | |
| Guo | Survey on WiFi infrastructure attacks | |
| US9100429B2 (en) | Apparatus for analyzing vulnerability of wireless local area network | |
| Shourbaji et al. | Wireless intrusion detection systems (WIDS) | |
| VanSickle et al. | Effectiveness of tools in identifying rogue access points on a wireless network | |
| Efe et al. | Wi-fi security analysis for E&M-Government applications | |
| Sobh et al. | Securing hybrid architecture of cloudlet computing in 5G networks enabling IoT and mobile wireless devices | |
| Thakur et al. | RAPD algorithm: detection of rogue access point in wireless network | |
| KR102823857B1 (en) | Location-based Wi-Fi firewall building system and method | |
| Rofoo et al. | DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks | |
| Emeto et al. | Security Vulnerabilities of Wlan Protocols: A Review | |
| Diksha et al. | Backdoor Intrusion in Wireless Networks-problems and solutions | |
| Bhuiyan et al. | Investigation on unauthorized human activity watching through leveraging Wi-Fi signals | |
| Sinha et al. | Wireless intrusion protection system using distributed collaborative intelligence | |
| Athawale et al. | Towards effective client-server based advent intrusion prevention system for WLAN | |
| Zaman et al. | Implementation of some enhancements in wireless network security by finding vulnerabilities, threats and attacks | |
| Pattar | Detection Of Rogue Access Points Present In The Wlan At The Server Side |