메뉴 건너뛰기




Volumn , Issue , 2006, Pages 141-150

Specification-based intrusion detection in WLANs

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; NETWORK PROTOCOLS; SPECIFICATIONS; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 39049109285     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.48     Document Type: Conference Paper
Times cited : (23)

References (15)
  • 2
    • 4544342574 scopus 로고    scopus 로고
    • A specification-based intrusion detection system for AODV
    • S. Setia and V. Swarup, editors, ACM
    • C.-Y. Chin-Yang Tseng, B. P., C. Ko, R. Limprasittiporn, J. Rowe, and K. N. Levitt. A specification-based intrusion detection system for AODV. In S. Setia and V. Swarup, editors, SASN, pages 125-134. ACM, 2003.
    • (2003) SASN , pp. 125-134
    • Chin-Yang Tseng, C.-Y.1    Ko, B.P.C.2    Limprasittiporn, R.3    Rowe, J.4    Levitt, K.N.5
  • 3
    • 0038391162 scopus 로고    scopus 로고
    • Agent based intrusion detection and response system for wireless LANs
    • 11-15 May
    • M. Chirumamilla and B. Ramamurthy. Agent based intrusion detection and response system for wireless LANs. In IEEE ICC '03. Volume: 1 , 11-15 May, pages 492-496, 2003.
    • (2003) IEEE ICC '03 , vol.1 , pp. 492-496
    • Chirumamilla, M.1    Ramamurthy, B.2
  • 4
    • 35548944839 scopus 로고    scopus 로고
    • Intrusion detection: Introduction to intrusion detection and security information management
    • H. Debar and J. Viinikka. Intrusion detection: Introduction to intrusion detection and security information management. In FOSAD 2004/2005, 2005.
    • (2005) FOSAD , vol.2004-2005
    • Debar, H.1    Viinikka, J.2
  • 5
    • 84872818485 scopus 로고    scopus 로고
    • R. Gill, J. Smith, and A. Clark. Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In R. Safavi-Naini, C. Steketee, and W. Susilo, editors, Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 54 of CRPIT, pages 221-230, Hobart, Australia, 2006. ACS.
    • R. Gill, J. Smith, and A. Clark. Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks. In R. Safavi-Naini, C. Steketee, and W. Susilo, editors, Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), volume 54 of CRPIT, pages 221-230, Hobart, Australia, 2006. ACS.
  • 6
    • 33745663748 scopus 로고    scopus 로고
    • Sequence number-based MAC address spoof detection
    • A. Valdes and D. Zamboni, editors, RAID, of, Springer
    • F. Guo and T. Chiueh. Sequence number-based MAC address spoof detection. In A. Valdes and D. Zamboni, editors, RAID, volume 3858 of LNCS, pages 309 - 329. Springer, 2005.
    • (2005) LNCS , vol.3858 , pp. 309-329
    • Guo, F.1    Chiueh, T.2
  • 8
    • 39049121719 scopus 로고    scopus 로고
    • IEEE Std 802.11i-2004. WLAN Security Standard. IEEE Standards Association, 23rd July 2004.
    • IEEE Std 802.11i-2004. WLAN Security Standard. IEEE Standards Association, 23rd July 2004.
  • 9
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras. State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Software Eng., 21 (3): 181-199, 1995.
    • (1995) IEEE Trans. Software Eng , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 12
    • 39049086740 scopus 로고    scopus 로고
    • An Initial Security Analysis of the IEEE 802.IX Standard
    • Technical report
    • A. Mishra and W. Arbaugh. An Initial Security Analysis of the IEEE 802.IX Standard. Technical report, 2003.
    • (2003)
    • Mishra, A.1    Arbaugh, W.2
  • 13
    • 0038011179 scopus 로고    scopus 로고
    • Specification-based anomaly detection: A new approach for detecting network intrusions
    • V. Atluri, editor, ACM
    • R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and Z. S. Specification-based anomaly detection: a new approach for detecting network intrusions. In V. Atluri, editor, ACM CCS, pages 265 - 274. ACM, 2002.
    • (2002) ACM CCS , pp. 265-274
    • Sekar, R.1    Gupta, A.2    Frullo, J.3    Shanbhag, T.4    Tiwari, A.5    Yang, H.6    Zhou, S.7
  • 14
    • 39049165708 scopus 로고    scopus 로고
    • D. Stanley, J. Walker, and B. Aboba. Extensible authentication protocol (EAP) method requirements for wireless LANs. Technical report, IETF, 2005. RFC 4017.
    • D. Stanley, J. Walker, and B. Aboba. Extensible authentication protocol (EAP) method requirements for wireless LANs. Technical report, IETF, 2005. RFC 4017.
  • 15
    • 39049171890 scopus 로고    scopus 로고
    • J. Wright. Detecting wireless LAN MAC address spoofing, 2003. White paper.
    • J. Wright. Detecting wireless LAN MAC address spoofing, 2003. White paper.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.