[go: up one dir, main page]

Abed, 2010 - Google Patents

IEEE 802.11 i Security and Vulnerabilities

Abed, 2010

View PDF
Document ID
8667102701528261760
Author
Abed R
Publication year

External Links

Snippet

Despite using a variety of comprehensive preventive security measures, the Robust Secure Networks (RSNs) remain vulnerable to a number of attacks. Failure of preventive measures to address all RSN vulnerabilities dictates the need for enhancing the performance of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Similar Documents

Publication Publication Date Title
EP1834466B1 (en) Method and system for detecting attacks in wireless data communication networks
Ma et al. A hybrid rogue access point protection framework for commodity Wi-Fi networks
Bicakci et al. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
US8281392B2 (en) Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
Alotaibi et al. Rogue access point detection: Taxonomy, challenges, and future directions
Aime et al. Dependability in wireless networks: Can we rely on WiFi?
EP2023571A1 (en) Method and system for wireless communications characterized by IEEE 802.11W and related protocols
Gonzales et al. Practical defenses for evil twin attacks in 802.11
WO2011041200A1 (en) Extensible authentication protocol attack detection systems and methods
Lindqvist et al. Privacy-preserving 802.11 access-point discovery
Ma et al. RAP: Protecting commodity wi-fi networks from rogue access points
Scarfone et al. Guide to securing legacy IEEE 802.11 wireless networks
Yang et al. Security in wireless local area networks
Pammi Threats, countermeasures, and research trends for BLE-based IoT devices
Gill Intrusion detection techniques in wireless local area networks
Abed IEEE 802.11 i Security and Vulnerabilities
Agrawal et al. Secure mobile computing
Faraj Security technologies for wireless access to local area networks
Scarfone et al. Wireless Network Security for IEEE 802.11 a/b/g and Bluetooth (DRAFT)
Kanaujia Rogue Access Point Detection through Statistical Analysis
Shah Certificate
Neumerkel et al. A sophisticated solution for revealing attacks on wireless LAN
Borgi Access control and availability aspects using wireless solutions based on IEEE 802.11 technologies, providing access to classified networks
Ma et al. Passive listening and intrusion management in commodity wi-fi networks
Ma et al. Security Access in Wireless Local Area Networks