메뉴 건너뛰기




Volumn 2, Issue 5, 2009, Pages 373-391

Collaborative attacks in WiMAX networks

Author keywords

Collaborative attacks; Computer networks; Security; WiMAX

Indexed keywords

CHANNEL ESTIMATION; COMPUTER CRIME; COMPUTER NETWORKS; DECISION MAKING; MOBILE SECURITY; WIMAX;

EID: 70350227123     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.127     Document Type: Article
Times cited : (11)

References (60)
  • 1
    • 70350212888 scopus 로고    scopus 로고
    • WiMAX security for real-world network service provider deployments
    • Motorola Inc
    • Motorola Inc. WiMAX security for real-world network service provider deployments. White Paper, 2007.
    • (2007) White Paper
  • 2
    • 31344451091 scopus 로고    scopus 로고
    • Security vulnerabilities: From analysis to detection and masking techniques (invited paper). In Proceedings of the IEEE, Vol
    • Chen S, Xu J, Kalbarczyk Z, Iyer R. Security vulnerabilities: from analysis to detection and masking techniques (invited paper). In Proceedings of the IEEE, Vol. 94, Issue 2, February 2006.
    • (2006) 94, Issue , pp. 2
    • Chen, S.1    Xu, J.2    Kalbarczyk, Z.3    Iyer, R.4
  • 5
    • 84947615185 scopus 로고    scopus 로고
    • http://www.sans.org/reading room/whitepapers/vpns/the_daydes_died_722
  • 6
    • 33750365498 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • Ramachandran A, Feamster N. Understanding the network-level behavior of spammers. In ACM SIGCOMM, Vol. 36, 2006.
    • (2006) ACM SIGCOMM , pp. 36
    • Ramachandran, A.1    Feamster, N.2
  • 8
    • 0042536226 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an Internet worm
    • Moore D, Shannon C, Brown J. Code-red: a case study on the spread and victims of an Internet worm. In ACM/USENIX IMW, 2002.
    • (2002) ACM/USENIX IMW
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 11
    • 84947616391 scopus 로고    scopus 로고
    • http://www.dshield.org/
  • 14
    • 51649125749 scopus 로고    scopus 로고
    • Security considerations for handover schemes in mobile WiMAX networks
    • Hur J, Shim H, Kim P, Yoon H, Song N. Security considerations for handover schemes in mobile WiMAX networks. In IEEE WCNC, 2008.
    • (2008) IEEE WCNC
    • Hur, J.1    Shim, H.2    Kim, P.3    Yoon, H.4    Song, N.5
  • 17
    • 0842289243 scopus 로고    scopus 로고
    • Detection of invalid routing announcements in the RIP protocol
    • Pei D, Massey D, Zhang L. Detection of invalid routing announcements in the RIP protocol. In GLOBECOM, 2003.
    • (2003) GLOBECOM
    • Pei, D.1    Massey, D.2    Zhang, L.3
  • 21
    • 84885890388 scopus 로고    scopus 로고
    • A stochastic modeling of coordinated internal and external attacks
    • Technical Report. Available at
    • Li X, Xu S. A stochastic modeling of coordinated internal and external attacks. Technical Report. Available at: http://www.cs.utsa.edu/shxu/collaborative-attack-model.pdf
    • Li, X.1    Xu, S.2
  • 26
    • 84942253601 scopus 로고    scopus 로고
    • COSSACK: Coordinated suppression of simultaneous attacks
    • Hussain A, Heidemann J, Papadopoulos C. COSSACK: coordinated suppression of simultaneous attacks. In DISCEX, 2003.
    • (2003) DISCEX
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 29
    • 70350230489 scopus 로고    scopus 로고
    • IEEE standard for local and metropolitan area networks part 16: Air interface for fixed broadband wireless access systems
    • The Institute of Electrical and Electronics Engineers
    • The Institute of Electrical and Electronics Engineers. IEEE standard for local and metropolitan area networks part 16: air interface for fixed broadband wireless access systems. IEEE Std 802.16-2004, IEEE, 2004.
    • (2004) IEEE Std 802.16-2004, IEEE
  • 30
    • 84947611219 scopus 로고    scopus 로고
    • http://wirelessman.org/relay/
  • 31
    • 84947612010 scopus 로고    scopus 로고
    • Harmonized contribution on 802.16j (mobile multihop relay) usage models
    • Sydir J. Harmonized contribution on 802.16j (mobile multihop relay) usage models. IEEE 802.16j task group, 2006.
    • (2006) IEEE 802.16j task group
    • Sydir, J.1
  • 32
    • 70350219039 scopus 로고    scopus 로고
    • Effect of cooperative black hole attack on mobile ad hoc networks
    • Ramaswamy S, Fu H, Nygard K. Effect of cooperative black hole attack on mobile ad hoc networks. In ICWN, 2005.
    • (2005) ICWN
    • Ramaswamy, S.1    Fu, H.2    Nygard, K.3
  • 33
    • 33745403778 scopus 로고    scopus 로고
    • Defending against wormhole attacks in mobile ad hoc networks
    • Issue, June
    • Wang W, Bhargava B, Lu Y, Wu X. Defending against wormhole attacks in mobile ad hoc networks. In WCMC, Vol. 6, Issue 4, June 2006; 483-503.
    • (2006) WCMC , vol.6 , Issue.4 , pp. 483-503
    • Wang, W.1    Bhargava, B.2    Lu, Y.3    Wu, X.4
  • 34
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
    • Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In IEEE INFO- COM, 2003.
    • (2003) IEEE INFO- COM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 36
    • 34547170668 scopus 로고    scopus 로고
    • SybilGuard: Defending against Sybil attacks via social networks
    • Yu H, Kaminsky M, Gibbons P, Flaxman A. SybilGuard: defending against Sybil attacks via social networks. In ACM SIGCOMM, 2006.
    • (2006) ACM SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.3    Flaxman, A.4
  • 37
    • 84947618732 scopus 로고    scopus 로고
    • http://wirelessman.org/le/contrib/C80216h-05 045.pdf
  • 38
    • 84947613041 scopus 로고    scopus 로고
    • Unlicensed operation Of IEEE 802.16: Coex-istance with 802.11(A)
    • Berlemann L. Unlicensed operation Of IEEE 802.16: coex-istance with 802.11(A) In Shared Frequency Bands, PIMRC, 2006.
    • (2006) Shared Frequency Bands, PIMRC
    • Berlemann, L.1
  • 40
    • 84947614145 scopus 로고    scopus 로고
    • Nessus Security Scanner, Available at
    • Nessus Security Scanner. Available at: http://www.nessus.org, 2008.
    • (2008)
  • 41
    • 84947618363 scopus 로고    scopus 로고
    • Security Administrator Tool for Analyzing Networks (SATAN), Available at:, June
    • Security Administrator Tool for Analyzing Networks (SATAN). Available at: http://www.porcupine.org/satan, June 2008.
    • (2008)
  • 42
    • 84947613944 scopus 로고    scopus 로고
    • Computer Emergency Response Team (CERT), Available at
    • Computer Emergency Response Team (CERT). Available at: http://www.cert.org/, 2009.
    • (2009)
  • 43
    • 84947617106 scopus 로고    scopus 로고
    • NIST's National Vulnerability Database. Available at
    • NIST's National Vulnerability Database. Available at: http://nvd.nist.gov, 2009.
    • (2009)
  • 44
    • 20444480299 scopus 로고    scopus 로고
    • Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the
    • Noel S, Jajodia S. Managing attack graph complexity through visual hierarchical aggregation. In Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Secu- rity, 2004; 109-118.
    • (2004) ACM Workshop on Visualization and Data Mining for Computer Security , vol.2004 , pp. 109-118
    • Noel, S.1    Jajodia, S.2
  • 52
    • 24944500947 scopus 로고    scopus 로고
    • Risk management using behavior based bayesian networks. Intelligence and Security Informatics
    • Dantu R, Kolan P. Risk management using behavior based bayesian networks. Intelligence and Security Informatics, LNCS, Vol. 3495, 2005; 115-126.
    • (2005) LNCS , vol.3495 , pp. 115-126
    • Dantu, R.1    Kolan, P.2
  • 55
    • 37849021677 scopus 로고    scopus 로고
    • Measuring overall security of network configurations using attack graphs
    • Wang L, Singhal A, Jajodia S. Measuring overall security of net- work configurations using attack graphs. Data and Applications Security XXI, Vol. 4602, August 2007; 98-112.
    • (2007) Data and Applications Security XXI , vol.4602 , pp. 98-112
    • Wang, L.1    Singhal, A.2    Jajodia, S.3
  • 58
    • 0020782217 scopus 로고
    • A causal model for analyzing distributed concurrency control algorithms
    • Bhargava B, Hua C. A causal model for analyzing distributed concurrency control algorithms. IEEE Transactions on Software Engineering 1983; 9(4): 470-486.
    • (1983) IEEE Transactions on Software Engineering , vol.9 , Issue.4 , pp. 470-486
    • Bhargava, B.1    Hua, C.2
  • 59
    • 84947617600 scopus 로고    scopus 로고
    • http://www.ssfnet.org/homePage.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.