메뉴 건너뛰기




Volumn 60, Issue 2, 2010, Pages 307-318

IEEE 802.11 user fingerprinting and its applications for intrusion detection

Author keywords

802.11; Fingerprinting; Intrusion detection

Indexed keywords

802.11; CRIMINAL INVESTIGATION; FINGERPRINTING; FINGERPRINTING TECHNIQUES; HOTSPOTS; IEEE 802.11 NETWORKS; IEEE 802.11 WIRELESS LAN; IEEE 802.11S; INTERNET ACCESS; MAC PROTOCOL; MEDIUM ACCESS CONTROL LAYER; NETWORK PERFORMANCE ANALYSIS; NETWORK TRAFFIC; NETWORK USERS; PROTOCOL ANALYZERS; SAMPLING DATA; TRAFFIC CHARACTERISTICS; TRAINING DATA; WIRELESS ACCESS POINTS;

EID: 77955713637     PISSN: 08981221     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.camwa.2010.01.002     Document Type: Article
Times cited : (42)

References (31)
  • 3
    • 77955715123 scopus 로고    scopus 로고
    • WiGLE.net, http://www.wigle.net/gps/gps/main.
  • 10
    • 51349162676 scopus 로고    scopus 로고
    • A hybrid rogue access point protection framework for commodity Wi-Fi networks
    • L. Ma, A.Y. Teymorian, X. Cheng, A hybrid rogue access point protection framework for commodity Wi-Fi networks, in: IEEE INFOCOM 2008, pp. 12201228.
    • (2008) IEEE INFOCOM , pp. 1220-1228
    • Ma, L.1    Teymorian, A.Y.2    Cheng, X.3
  • 13
    • 4544324338 scopus 로고    scopus 로고
    • DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
    • M. Raya, J.P. Hubaux, I. Aad, DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots, in: Proceedings of the ACM MobiSys 2004, pp. 8497.
    • (2004) Proceedings of the ACM MobiSys , pp. 84-97
    • Raya, M.1    Hubaux, J.P.2    Aad, I.3
  • 14
    • 54249117650 scopus 로고    scopus 로고
    • Secure scalable group signature with dynamic joins and separable authorities
    • A. Kiayias, and M. Yung Secure scalable group signature with dynamic joins and separable authorities International Journal of Security and Networks 1 12 2006 24 45
    • (2006) International Journal of Security and Networks , vol.1 , Issue.12 , pp. 24-45
    • Kiayias, A.1    Yung, M.2
  • 17
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • H. Englund, and T. Johansson Three ways to mount distinguishing attacks on irregularly clocked stream ciphers International Journal of Security and Networks 1 12 2006 95 102
    • (2006) International Journal of Security and Networks , vol.1 , Issue.12 , pp. 95-102
    • Englund, H.1    Johansson, T.2
  • 18
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multihop data delivery in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra Limiting DoS attacks during multihop data delivery in wireless sensor networks International Journal of Security and Networks 1 34 2006 167 178
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 19
    • 77955716028 scopus 로고    scopus 로고
    • The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones
    • X. Wang The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones International Journal of Security and Networks 1 34 2006 184 197
    • (2006) International Journal of Security and Networks , vol.1 , Issue.34 , pp. 184-197
    • Wang, X.1
  • 23
    • 74049111426 scopus 로고    scopus 로고
    • Hash-AV: Fast virus signature scanning by cache-resident filters
    • O. Erdogan, and P. Cao Hash-AV: Fast virus signature scanning by cache-resident filters International Journal of Security and Networks 2 12 2007 50 59
    • (2007) International Journal of Security and Networks , vol.2 , Issue.12 , pp. 50-59
    • Erdogan, O.1    Cao, P.2
  • 24
    • 39349109602 scopus 로고    scopus 로고
    • Design and analysis of a multipacket signature detection system
    • N.S. Artan, and H.J. Chao Design and analysis of a multipacket signature detection system International Journal of Security and Networks 2 12 2007 122 136
    • (2007) International Journal of Security and Networks , vol.2 , Issue.12 , pp. 122-136
    • Artan, N.S.1    Chao, H.J.2
  • 26
    • 77955714466 scopus 로고    scopus 로고
    • Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
    • I. Ray, and N. Poolsappasit Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents International Journal of Security and Networks 3 2 2008 80 94
    • (2008) International Journal of Security and Networks , vol.3 , Issue.2 , pp. 80-94
    • Ray, I.1    Poolsappasit, N.2
  • 31
    • 70350060199 scopus 로고    scopus 로고
    • Flow-net methodology for accountability in wireless networks
    • Y. Xiao Flow-net methodology for accountability in wireless networks IEEE Network 23 5 2009 30 37
    • (2009) IEEE Network , vol.23 , Issue.5 , pp. 30-37
    • Xiao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.