메뉴 건너뛰기




Volumn 3858 LNCS, Issue , 2006, Pages 309-329

Sequence number-based MAC address spoof detection

Author keywords

Sequence number; Wireless LAN MAC spoof detection; WLAN monitoring and intrusion detection

Indexed keywords

SEQUENCE NUMBER; SPOOFING; WIRELESS LAN MAC SPOOF DETECTION; WLAN MONITORING AND INTRUSION DETECTION;

EID: 33745663748     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11663812_16     Document Type: Conference Paper
Times cited : (101)

References (20)
  • 1
    • 84858923724 scopus 로고    scopus 로고
    • IEEE 802.11 Standard
    • IEEE 802.11 Standard, http://standards.ieee.org/getieee802/download/802. 11-1999.pdf
  • 2
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington D.C., August
    • J. Bellardo and S. Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium, Washington D.C., August 2003.
    • (2003) Proceedings of the USENIX Security Symposium
    • Bellardo, J.1    Savage, S.2
  • 3
    • 84858927024 scopus 로고    scopus 로고
    • WEPWedgie. http://sourceforge.net/projects/wepwedgie/
    • WEPWedgie
  • 4
    • 84858927538 scopus 로고    scopus 로고
    • voidll. http://www.wlsec.net/void11/
    • Voidll
  • 5
    • 84858928891 scopus 로고    scopus 로고
    • AirJack. http://sourceforge.net/projects/airjack/
    • AirJack
  • 6
    • 84858920694 scopus 로고    scopus 로고
    • Airsnarf. http://airsnarf.shmoo.com/
  • 7
    • 84858918247 scopus 로고    scopus 로고
    • KisMAC. http://binaervarianz.de/projekte/programmieren/kismac/
    • KisMAC
  • 8
    • 84858921328 scopus 로고    scopus 로고
    • dsnifF. http://www.monkey.org/~dugsong/dsniff
    • DsnifF
  • 9
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • N. Borisov, I. Goldberg, and D. Wagner. Intercepting Mobile Communications: The Insecurity of 802.11. Mobicom 2001
    • Mobicom 2001
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3
  • 13
    • 51349089007 scopus 로고    scopus 로고
    • Using transceiverprints for anomaly based intrusion detection
    • CIIT 2004, November 22-24, St. Thomas, US Virgin Islands
    • J. Hall, M. Barbeau and E. Kranakis. Using Transceiverprints for Anomaly Based Intrusion Detection. In Proceedings of 3rd IASTED, CIIT 2004, November 22-24, 2004, St. Thomas, US Virgin Islands.
    • (2004) Proceedings of 3rd IASTED
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 16
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802.1X standard
    • Department of Computer Science, University of Maryland, College Park, December
    • A. Mishra and W. Arbaugh. An Initial Security Analysis of the IEEE 802.1X Standard. CS-TR 4328, Department of Computer Science, University of Maryland, College Park, December 2002.
    • (2002) CS-TR , vol.4328
    • Mishra, A.1    Arbaugh, W.2
  • 18
    • 84858919310 scopus 로고    scopus 로고
    • Aruba Wireless Networks. Wireless Intrusion Protection, http://www. arubanetworks.com/pdf/techbrief-IDS.pdf
    • Wireless Intrusion Protection
  • 19
    • 84858924844 scopus 로고    scopus 로고
    • AirMagnet. http://www.airmagnet.com/products/enterprise.htm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.