메뉴 건너뛰기




Volumn , Issue , 2006, Pages 221-226

802.11 Disassociation DoS attack and its solutions: A survey

Author keywords

802.11; Denial of service DoS; Disassociation; Wireless security

Indexed keywords

ARSENIC COMPOUNDS; COMPUTER CRIME; MOBILE COMPUTING; STANDARDS; SURVEYS; TELECOMMUNICATION; TELECOMMUNICATION TRAFFIC; WIRELESS LOCAL AREA NETWORKS (WLAN); WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 47249092804     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MCWC.2006.4375225     Document Type: Conference Paper
Times cited : (16)

References (51)
  • 1
    • 47249113769 scopus 로고    scopus 로고
    • IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
    • IEEE Standard 802.11-1999. Wireless LAN Medium Access Control and Physical Layer Specifications. 1999.
  • 2
    • 47249140253 scopus 로고    scopus 로고
    • R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
    • R. L. Rivest. The RC4 Encryption Algorithm. RSA Data Security, Inc., Mar. 12, 1992. (Proprietary).
  • 3
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe At Any Key Size: An Analysis of the WEP Encapsulation,
    • 03628E, IEEE 802.11 Committee, Mar
    • J. Walker, Unsafe At Any Key Size: An Analysis of the WEP Encapsulation, tech. report 03628E, IEEE 802.11 Committee, Mar. 2000.
    • (2000) tech. report
    • Walker, J.1
  • 6
    • 0003477171 scopus 로고    scopus 로고
    • Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
    • Technical Report TD-4ZCPZZ, AT&T Labs
    • A.Stubblefield, J.Ioannidis, A.Rubin, Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Technical Report TD-4ZCPZZ, AT&T Labs(2001)
    • (2001)
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.3
  • 7
    • 47249092665 scopus 로고    scopus 로고
    • Airsnort: airsnort.shmoo.com
    • Airsnort: airsnort.shmoo.com
  • 8
    • 47249138111 scopus 로고    scopus 로고
    • Aircrack: www.cr0.net:8040/code/network/
    • Aircrack
  • 9
    • 47249084575 scopus 로고    scopus 로고
    • WepLab: weplab.sourceforge.net/
    • WepLab: weplab.sourceforge.net/
  • 12
    • 47249140252 scopus 로고    scopus 로고
    • Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
    • Core SDI. CRC32 compensation attack against ssh-1.5, July 1998: www.coresdi.com
  • 14
    • 47249142288 scopus 로고    scopus 로고
    • Airjack: sourceforge.net/projects/airjack
    • Airjack: sourceforge.net/projects/airjack/
  • 15
    • 47249128862 scopus 로고    scopus 로고
    • KisMAC: binaervarianz.de/projekte/
    • KisMAC: binaervarianz.de/projekte/
  • 16
    • 47249111578 scopus 로고    scopus 로고
    • Void11: www.wlsec.net/void11/
    • Void11
  • 19
    • 47249095263 scopus 로고    scopus 로고
    • IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
    • IEEE Standard 802.1X-2004 Port-Based Network Access Control. December, 2004
  • 21
    • 47249119533 scopus 로고    scopus 로고
    • coWPAtty: new.remote-exploit.org/
    • coWPAtty: new.remote-exploit.org/
  • 22
    • 0013046241 scopus 로고    scopus 로고
    • An initial security analysis of the IEEE 802. IX standard. Technical Report
    • Dept. Of CS, Univ. of Maryland, Feb
    • A. Mishra and W. A. Arbaugh, An initial security analysis of the IEEE 802. IX standard. Technical Report, UMIACS-TR-2002-10, Dept. Of CS, Univ. of Maryland, Feb. 2002.
    • (2002) UMIACS-TR-2002-10
    • Mishra, A.1    Arbaugh, W.A.2
  • 24
    • 47249131951 scopus 로고    scopus 로고
    • IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
    • IEEE P802.11i - 2004. Medium Access Control Security Enhancements. July 2004
  • 25
    • 47249116431 scopus 로고    scopus 로고
    • Advanced Encryption Standard (FIPS PUB 197). National Institute of Standards and Technology (NIST), November 2001.
    • "Advanced Encryption Standard (FIPS PUB 197)." National Institute of Standards and Technology (NIST), November 2001.
  • 26
    • 47249091671 scopus 로고    scopus 로고
    • AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
    • AusCERT. Denial of Service Vulnerability in IEEE 802.11 Wireless Devices . AusCERT AA-2004.02, Australian Computer Emergency Response Team, www.auscert.org.au/ ,2004.
  • 27
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 Denial-of-Service attacks: Real vulnerabilities andpractical solutions
    • August
    • J. Bellardo, and S. Savage. 802.11 Denial-of-Service attacks: real vulnerabilities andpractical solutions. In Proc. of the USENIX Security Symposium, pp. 15-28, August, 2003.
    • (2003) Proc. of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 28
    • 47249157532 scopus 로고    scopus 로고
    • SpoofMAC
    • SpoofMAC: www.klcconsulting.net/smac/
  • 29
    • 47249110143 scopus 로고    scopus 로고
    • Airsnarf: airsnarf.shmoo.com
    • Airsnarf: airsnarf.shmoo.com
  • 32
    • 4544330951 scopus 로고    scopus 로고
    • Detecting Wireless LAN MAC Address Spoofing,
    • jwright/papers
    • J. Wright, Detecting Wireless LAN MAC Address Spoofing, (2003): home.jwu.edu/jwright/papers/
    • Wright, J.1
  • 37
    • 47249134897 scopus 로고    scopus 로고
    • Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks
    • Q. Li, W. Trappe, Relationship-based Detection of Spoofing and Anomalous Traffic in Wireless Networks, Presentation, www.winlab.rutgers.edu/pub/docs/iab/ 20 0 5Fall/
    • Presentation
    • Li, Q.1    Trappe, W.2
  • 38
    • 47249152152 scopus 로고    scopus 로고
    • Detecting and Blocking Unauthorized Access in Wi-Fi Networks
    • H. Xia, and J. Brustoloni, Detecting and Blocking Unauthorized Access in Wi-Fi Networks. In Proc. of Networking'2004
    • Proc. of Networking'2004
    • Xia, H.1    Brustoloni, J.2
  • 39
    • 47249161014 scopus 로고    scopus 로고
    • B. Aboba, IEEE 802. IX PreAuthentication. Presentation to 802.11WGi, July 2002.
    • B. Aboba, IEEE 802. IX PreAuthentication. Presentation to 802.11WGi, July 2002.
  • 41
    • 47249150846 scopus 로고    scopus 로고
    • Validating 802.11 Disassociation and Deauthentication messages
    • September
    • T. Moore, Validating 802.11 Disassociation and Deauthentication messages. Submission to IEEE P802.11 TGi, September, 2002.
    • (2002) Submission to IEEE P802.11 TGi
    • Moore, T.1
  • 44
    • 3142761839 scopus 로고    scopus 로고
    • An enhanced one-bit identity authentication protocol for access control in IEEE 802.11
    • H. Wang and A. Velayutham. An enhanced one-bit identity authentication protocol for access control in IEEE 802.11. Proc. of IEEE MILCOM'03, Mil. Comm., 2003, pp 839 -843
    • (2003) Proc. of IEEE MILCOM'03, Mil. Comm , pp. 839-843
    • Wang, H.1    Velayutham, A.2
  • 47
    • 51349089007 scopus 로고    scopus 로고
    • Using Transceiverprints for Anomaly Based Intrusion Detection
    • US Virgin Islands, November
    • J. Hall, M. Barbeau and E. Kranakis, Using Transceiverprints for Anomaly Based Intrusion Detection. In Proc. of 3rd IASTED, CUT 2004, US Virgin Islands, November 2004
    • (2004) Proc. of 3rd IASTED, CUT 2004
    • Hall, J.1    Barbeau, M.2    Kranakis, E.3
  • 49
    • 47249142287 scopus 로고    scopus 로고
    • AirDefense: www.airdefense.net
    • AirDefense
  • 50
    • 47249095645 scopus 로고    scopus 로고
    • AirMagnet: www.airmagnet.com
    • AirMagnet
  • 51
    • 47249096094 scopus 로고    scopus 로고
    • AirSnare: home.comcast.net
    • AirSnare: home.comcast.net


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.