메뉴 건너뛰기




Volumn , Issue , 2007, Pages 37-42

Towards effective wireless intrusion detection in IEEE 802.11i

Author keywords

IEEE 802.11i; Wireless intrusion detection systems; Wireless network attacks; Wireless security

Indexed keywords

COMPUTER CRIME; INTRUSION DETECTION; SECURITY OF DATA; STANDARDS; TECHNICAL PRESENTATIONS; UBIQUITOUS COMPUTING;

EID: 47649094207     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPERU.2007.18     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 3042645886 scopus 로고    scopus 로고
    • IEEE 802.11 Standard
    • IEEE Standards Association
    • IEEE Standards Association, IEEE 802.11 Standard, http://standards.ieee. org/getieee802/download/802.11a-1999.pdf.
  • 6
    • 47649114646 scopus 로고    scopus 로고
    • IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology -Telecommunications and information exchange between systems, April 2004.
    • IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information Technology -Telecommunications and information exchange between systems, April 2004.
  • 8
    • 84925368904 scopus 로고    scopus 로고
    • 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
    • Washington D.C, USA
    • Bellardo, J. & Savage, S., "802.11 denial-of-service attacks: Real vulnerabilities and practical solutions", in proc. of the USENIX Security Symposium, pp. 15-28, Washington D.C., USA, 2003.
    • (2003) proc. of the USENIX Security Symposium , pp. 15-28
    • Bellardo, J.1    Savage, S.2
  • 9
    • 0013046241 scopus 로고    scopus 로고
    • An Initial Security Analysis of the IEEE 802.1X Standard
    • Technical report, CS-TR-4328, UMIACS-TR-2002-10
    • Mishra, A. & Arbaugh, W. A., "An Initial Security Analysis of the IEEE 802.1X Standard", Technical report, CS-TR-4328, UMIACS-TR-2002-10, 2002.
    • (2002)
    • Mishra, A.1    Arbaugh, W.A.2
  • 10
    • 33846676697 scopus 로고    scopus 로고
    • A sliding window based Management Traffic Clustering Algorithm for 802.11 WLAN intrusion detection
    • Zhou, W., Marshall, A., Gu, Q., "A sliding window based Management Traffic Clustering Algorithm for 802.11 WLAN intrusion detection", IFIP International Federation for Information Processing 213, pp. 55-64, 2006.
    • (2006) IFIP International Federation for Information Processing , vol.213 , pp. 55-64
    • Zhou, W.1    Marshall, A.2    Gu, Q.3
  • 11
    • 33745945665 scopus 로고    scopus 로고
    • Lightweight wireless intrusion detection systems against DDoS attack, Lecture Notes in Computer Science 3984
    • Lee, H.-W., "Lightweight wireless intrusion detection systems against DDoS attack", Lecture Notes in Computer Science 3984 LNCS, pp. 294-302, 2006.
    • (2006) LNCS , pp. 294-302
    • Lee, H.-W.1
  • 14
    • 21144443798 scopus 로고    scopus 로고
    • Intrusion detection for Wardriving in wireless network
    • Institute of Technology
    • Feng, L.-P., Liu, M.-Y., Liu, X.-N., "Intrusion detection for Wardriving in wireless network", Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology 25 (5), pp. 415-418, 2005.
    • (2005) Beijing Ligong Daxue Xuebao/Transaction of Beijing , vol.25 , Issue.5 , pp. 415-418
    • Feng, L.-P.1    Liu, M.-Y.2    Liu, X.-N.3
  • 18
    • 47649122869 scopus 로고    scopus 로고
    • Extensible authentication protocol (EAP) and IEEE 802.1x: Tutorial and empirical experience
    • IEEE Dec, supl.32
    • Jyh-Cheng Chen; Yu-Ping Wang, "Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience", Communications Magazine, IEEE Volume 43, Issue 12, supl.26 - supl.32, Dec. 2005.
    • (2005) Communications Magazine , vol.43 , Issue.12 SUPL.26
    • Chen, J.-C.1    Wang, Y.-P.2
  • 19
    • 47649125943 scopus 로고    scopus 로고
    • Ferguson, N., Michael: An Improved MIC for 802.11 WEP, IEEE TGi doc 802.11-02/020r0, January 2002.
    • Ferguson, N., "Michael: An Improved MIC for 802.11 WEP, IEEE TGi doc 802.11-02/020r0, January 2002.
  • 20
    • 47649112233 scopus 로고    scopus 로고
    • Junaid, M., Dr Muid Mufti, M.Umar Ilyas, Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol, White Paper, electronically available at: http://whitepapers.techrepublic.com.com/whitepaper.aspx?&tags= attack&docid=268394.
    • Junaid, M., Dr Muid Mufti, M.Umar Ilyas, "Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol", White Paper, electronically available at: http://whitepapers.techrepublic.com.com/whitepaper.aspx?&tags= attack&docid=268394.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.