메뉴 건너뛰기




Volumn , Issue , 2008, Pages

A Hidden Markov Model based approach to detect rogue access points

Author keywords

Compromised rogue access points and denial of service; Hidden Markov Models; Rogue access points

Indexed keywords

COMPROMISED ROGUE ACCESS POINTS AND DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; EXPERIMENTAL VALIDATIONS; FALSE NEGATIVES; FALSE POSITIVES; HEADER DATUM; INTER-ARRIVAL TIME; MARKOV MODELS; NETWORK ADMINISTRATORS; NON-INTRUSIVE; ROGUE ACCESS POINTS; ROUGE ACCESS POINTS; TRAFFIC CHARACTERISTICS;

EID: 62349140533     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2008.4753358     Document Type: Conference Paper
Times cited : (22)

References (18)
  • 1
    • 62349101869 scopus 로고    scopus 로고
    • White Paper, Rogue Access Point Detection: Automatically Detect and Manage Wireless Threats to your Network. [Online] Available at http://www.proxim.com.
    • White Paper, Rogue Access Point Detection: Automatically Detect and Manage Wireless Threats to your Network. [Online] Available at http://www.proxim.com.
  • 6
    • 11244291937 scopus 로고    scopus 로고
    • A. Adya, P Bahl, R. Chandra, and L. Qui, Architecture and techniques for diagnosing faults in IEEE 802.11 infrastruture networks, in MobiCom, 2004.
    • A. Adya, P Bahl, R. Chandra, and L. Qui, "Architecture and techniques for diagnosing faults in IEEE 802.11 infrastruture networks", in MobiCom, 2004.
  • 8
    • 18144401989 scopus 로고    scopus 로고
    • R. Beyah, S. Kangude, G. Yu, B. Stirckland, and J. Copeland, Rogue access point detection using temporal traffic characteristics, In proc. Of GLOBECOM, Dallas, TX, 2004.
    • R. Beyah, S. Kangude, G. Yu, B. Stirckland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," In proc. Of GLOBECOM, Dallas, TX, 2004.
  • 9
    • 62349103711 scopus 로고    scopus 로고
    • S. Shetty, M. Song, and L. Ma, Rogue access point detection analysing network traffic characterstics, in MILCOM, Orlando, Florida, October 2007.
    • S. Shetty, M. Song, and L. Ma, "Rogue access point detection analysing network traffic characterstics," in MILCOM, Orlando, Florida, October 2007.
  • 10
    • 42149159995 scopus 로고    scopus 로고
    • th ACM SIGCOMM conference on Internet measurement, New York, NY, 2007.
    • th ACM SIGCOMM conference on Internet measurement, New York, NY, 2007.
  • 11
    • 51249109756 scopus 로고    scopus 로고
    • H. Yin, G. Chen, and J. Wang, Detecting Protected Layer-3 Rogue APs, In Proc. Of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems, Raleigh, NC, September 2007.
    • H. Yin, G. Chen, and J. Wang, "Detecting Protected Layer-3 Rogue APs," In Proc. Of the Fourth IEEE International Conference on Broadband Communications, Networks, and Systems, Raleigh, NC, September 2007.
  • 12
    • 62349087439 scopus 로고    scopus 로고
    • N. Ye, A Markov chain model of temporal behaviour for anomaly detection, the IEEE Systems Man and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000.
    • N. Ye, "A Markov chain model of temporal behaviour for anomaly detection," the IEEE Systems Man and Cybernetics Information Assurance and Security Workshop, West Point, NY, 2000.
  • 15
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb
    • Lawrence R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," In Proc of IEEE, Feb 1989.
    • (1989) Proc of IEEE
    • Rabiner, L.R.1
  • 16
    • 15544363902 scopus 로고    scopus 로고
    • David K. Y. Yau, John C. S. Lui, Feng liang, Yeung Yam, Defending Against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles, IEEE/ACM Transactions on Networking, 2005.
    • David K. Y. Yau, John C. S. Lui, Feng liang, Yeung Yam, "Defending Against Distributed Denial-of-Service Attacks with Max-Min Fair Server-Centric Router Throttles," IEEE/ACM Transactions on Networking, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.