Abed, 2010 - Google Patents
IEEE 802.11 i Security and VulnerabilitiesAbed, 2010
View PDF- Document ID
- 8667102701528261760
- Author
- Abed R
- Publication year
External Links
Snippet
Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (RSNs) remain vulnerable to a number of attacks. Failure of preventive measures to address all RSN vulnerabilities dictates the need for enhancing the performance of …
- 238000001514 detection method 0 abstract description 154
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1834466B1 (en) | Method and system for detecting attacks in wireless data communication networks | |
| Ma et al. | A hybrid rogue access point protection framework for commodity Wi-Fi networks | |
| Bicakci et al. | Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks | |
| US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
| Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
| Aime et al. | Dependability in wireless networks: Can we rely on WiFi? | |
| EP2023571A1 (en) | Method and system for wireless communications characterized by IEEE 802.11W and related protocols | |
| Gonzales et al. | Practical defenses for evil twin attacks in 802.11 | |
| WO2011041200A1 (en) | Extensible authentication protocol attack detection systems and methods | |
| Lindqvist et al. | Privacy-preserving 802.11 access-point discovery | |
| Ma et al. | RAP: Protecting commodity wi-fi networks from rogue access points | |
| Scarfone et al. | Guide to securing legacy IEEE 802.11 wireless networks | |
| Yang et al. | Security in wireless local area networks | |
| Pammi | Threats, countermeasures, and research trends for BLE-based IoT devices | |
| Gill | Intrusion detection techniques in wireless local area networks | |
| Abed | IEEE 802.11 i Security and Vulnerabilities | |
| Agrawal et al. | Secure mobile computing | |
| Faraj | Security technologies for wireless access to local area networks | |
| Scarfone et al. | Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT) | |
| Kanaujia | Rogue Access Point Detection through Statistical Analysis | |
| Shah | Certificate | |
| Neumerkel et al. | A sophisticated solution for revealing attacks on wireless LAN | |
| Borgi | Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks | |
| Ma et al. | Passive listening and intrusion management in commodity wi-fi networks | |
| Ma et al. | Security Access in Wireless Local Area Networks |