메뉴 건너뛰기




Volumn 2, Issue 3, 2007, Pages 157-166

Detailed DoS attacks in wireless networks and countermeasures

Author keywords

Countermeasures; DoS attacks; Vulnerabilities; Wireless network

Indexed keywords

COMPUTER CRIME; ELECTRONIC CRIME COUNTERMEASURES; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 34248333875     PISSN: 17438225     EISSN: 17438233     Source Type: Journal    
DOI: 10.1504/IJAHUC.2007.012417     Document Type: Conference Paper
Times cited : (12)

References (34)
  • 1
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion Detection Systems: A Survey and Taxonomy
    • Tech Report 99-15, Dept. of Comp Eng, Chalmers University, Chalmers University, Sweden
    • Axelsson, S. (2000) Intrusion Detection Systems: A Survey and Taxonomy, Tech Report 99-15, Dept. of Comp Eng., Chalmers University, Chalmers University, Sweden.
    • (2000)
    • Axelsson, S.1
  • 2
    • 34248327933 scopus 로고    scopus 로고
    • Cain and Abel Software (CAAS, ) Retrieved July 16, from
    • Cain and Abel Software (CAAS) (2005) Retrieved July 16, from www.oxidt.it.
    • (2005)
  • 4
    • 34248383656 scopus 로고    scopus 로고
    • CERT/CC (2001) Denial of Service Attacks, Available Online: http: //www.cert.org/tech_tips/denial_of_service.html.
    • CERT/CC (2001) Denial of Service Attacks, Available Online: http: //www.cert.org/tech_tips/denial_of_service.html.
  • 5
    • 34248395148 scopus 로고    scopus 로고
    • CISCO White paper (2004) Defining Strategies to Protect Against TCP SYN Denial of Service Attacks.
    • CISCO White paper (2004) Defining Strategies to Protect Against TCP SYN Denial of Service Attacks.
  • 7
    • 34248391850 scopus 로고    scopus 로고
    • CSI/FBI , Computer Security Institute, USA, Retrieved July 4, 2005 from
    • CSI/FBI (2004) Computer Crime and Security Survey, Ninth Annual Report, Computer Security Institute, USA, Retrieved July 4, 2005 from http://www.reddshell.com/docs/csi_fbi_2004.pdf.
    • (2004) Computer Crime and Security Survey, Ninth Annual Report
  • 8
    • 34248366550 scopus 로고    scopus 로고
    • Distributed Denial of Service (DDoS, ) Retrieved July 4, 2005 from
    • Distributed Denial of Service (DDoS) (2004) Retrieved July 4, 2005 from http://www.trinitysecurity.com/reference/bulletin/ Trinity-DDOS-Protecting-Critical-Systems.pdf.
    • (2004)
  • 9
    • 34248337924 scopus 로고    scopus 로고
    • Ethereal Software (ES, ) Retrieved July 8, from
    • Ethereal Software (ES) (2005) Retrieved July 8, from http:// www.ethereal.com/.
    • (2005)
  • 10
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Proceedings of Selected Areas of Cryptography SAC'01, Springer-Verlag, Berlin
    • Fluhrer, S., Mantin, I. and Shamir, A. (2001) 'Weaknesses in the key scheduling algorithm of RC4', Proceedings of Selected Areas of Cryptography (SAC'01), LNCS, Springer-Verlag, Berlin, Vol. 2259, pp.1-24.
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 11
    • 33947156720 scopus 로고    scopus 로고
    • French Security Incident Response Team FrSIRT, Retrieved July 23, from
    • French Security Incident Response Team (FrSIRT) (2005) Nortel Networks VPN Router 600 Denial of Service Vulnerability, Retrieved July 23, from http://www.frsirt.com/english/advisories/2005/0642.
    • (2005) Nortel Networks VPN Router 600 Denial of Service Vulnerability
  • 13
    • 33947108403 scopus 로고    scopus 로고
    • Retrieved July 4, 2005 from
    • Geier. J. (2003) Denial of Service a Big WLAN Issue, Retrieved July 4, 2005 from http://www.wifiplanet.com/tutorials/article.php/ 2200071.
    • (2003) Denial of Service a Big WLAN Issue
    • Geier, J.1
  • 18
    • 34248368095 scopus 로고    scopus 로고
    • Internet Control Message Protocol (ICMP, ) Retrieved July 24, from
    • Internet Control Message Protocol (ICMP) (2005) Retrieved July 24, from http://www.erg.abdn.ac.uk/users/gorry/course/inet-ages/icmp.html.
    • (2005)
  • 20
    • 34248346321 scopus 로고    scopus 로고
    • Link Ferret Software (LFS, ) Retrieved July 8, from
    • Link Ferret Software (LFS) (2005) Retrieved July 8, from http:// www.linkferret.ws/.
    • (2005)
  • 21
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of DDoS attack and DDoS defense mechanisms
    • Jelena, M. and Peter, R. (2004) 'A taxonomy of DDoS attack and DDoS defense mechanisms', ACM SIGCOMM, Computer Communication Review, Vol. 34, No. 2, pp.39-53.
    • (2004) ACM SIGCOMM, Computer Communication Review , vol.34 , Issue.2 , pp. 39-53
    • Jelena, M.1    Peter, R.2
  • 22
    • 34248370574 scopus 로고    scopus 로고
    • Mac Makeup Software (MMS, ) Retrieved July 14, from
    • Mac Makeup Software (MMS) (2005) Retrieved July 14, from http:// www.gorlani.com/publicprj/macmakeup/macmakeup.asp.
    • (2005)
  • 23
    • 84983188846 scopus 로고    scopus 로고
    • Retrieved July 29, 2005 from
    • McAfee (2005) Personal Firewall, Retrieved July 29, 2005 from http://www.mcafee.com/myapps/firewall/ov_firewall.asp.
    • (2005) Personal Firewall
    • McAfee1
  • 25
    • 34248398488 scopus 로고    scopus 로고
    • NetStumbler Software (NSS, ) Retrieved July 4, from
    • NetStumbler Software (NSS) (2005) Retrieved July 4, from http:// www.netstumbler.org.
    • (2005)
  • 26
    • 34248365670 scopus 로고    scopus 로고
    • Packetyzer Software (PS, ) Retrieved July 9, from
    • Packetyzer Software (PS) (2005) Retrieved July 9, from http:// www.networkchemistry.com/products/packetyzer/.
    • (2005)
  • 27
    • 34248350787 scopus 로고    scopus 로고
    • Ping Flood Software (PFS, ) Retrieved July 4, 2005 from
    • Ping Flood Software (PFS) (2005) Retrieved July 4, 2005 from www.portalsec.com.
    • (2005)
  • 29
    • 34248394330 scopus 로고    scopus 로고
    • US/CERT (2005) Multiple Denial-of-Service Vulnerabilities in Cisco IOS, Retrieved July 4, from http://www.us-cert.gov/cas/techalerts/ TA05-026A.html.
    • US/CERT (2005) Multiple Denial-of-Service Vulnerabilities in Cisco IOS, Retrieved July 4, from http://www.us-cert.gov/cas/techalerts/ TA05-026A.html.
  • 32
    • 84948951525 scopus 로고    scopus 로고
    • Throttling viruses: Restricting propagation to defeat malicious mobile code
    • Las Vegas, USA
    • Williamson, M. (2002) 'Throttling viruses: restricting propagation to defeat malicious mobile code', 18th Annual Comp. Sec. Applications Conference, Las Vegas, USA.
    • (2002) 18th Annual Comp. Sec. Applications Conference
    • Williamson, M.1
  • 33
    • 34248344664 scopus 로고    scopus 로고
    • Retrieved July 4, 2005 from
    • WLAN Attacks Explained (WLAN) (2003) Retrieved July 4, 2005 from http:// neworder.box.sk/newsread.php?newsid=7628.
    • (2003) WLAN Attacks Explained (WLAN)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.