메뉴 건너뛰기




Volumn 2, Issue 5, 2013, Pages 571-574

Impact of metric selection on wireless deauthentication dos attack performance

Author keywords

DeAuthentication; Denial of service; intrusion detection; metrics; security; WiFi

Indexed keywords

INTRUSION DETECTION; TRANSMISSION CONTROL PROTOCOL; WI-FI;

EID: 84890120877     PISSN: 21622337     EISSN: 21622345     Source Type: Journal    
DOI: 10.1109/WCL.2013.072513.130428     Document Type: Article
Times cited : (18)

References (11)
  • 1
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • May
    • V. A. Siris and F. Papagalou, Application of anomaly detection algorithms for detecting SYN flooding attacks, J. Computer Commun., vol. 29, no. 9, pp. 1433-1442, May 2009.
    • (2009) J. Computer Commun. , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 2
    • 84859820888 scopus 로고    scopus 로고
    • A MAC layer based defence architecture for reductionin-quality (RoQ) attacks in wireless LAN
    • Jan.
    • J. Singh, et al., A MAC layer based defence architecture for reductionin-quality (RoQ) attacks in wireless LAN, Int'l J. Computer Science and Inf. Security, vol. 7, no. 1, pp. 284-291, Jan. 2010.
    • (2010) Int'l J. Computer Science and Inf. Security , vol.7 , Issue.1 , pp. 284-291
    • Singh, J.1
  • 3
    • 77954310491 scopus 로고    scopus 로고
    • Impact of feature reduction on the efficiency of wireless intrusion detection systems
    • Aug.
    • K. El-Khatib, Impact of feature reduction on the efficiency of wireless intrusion detection systems, IEEE Trans. Parallel and Distrib. Syst., vol. 21, no. 8, pp. 1143-1149, Aug. 2010.
    • (2010) IEEE Trans. Parallel and Distrib. Syst. , vol.21 , Issue.8 , pp. 1143-1149
    • El-Khatib, K.1
  • 4
    • 79960403099 scopus 로고    scopus 로고
    • Category-based selection of effective parameters for intrusion detection
    • Sept.
    • P. B. Zargar and G. R. A. Kabiri, Category-based selection of effective parameters for intrusion detection, Int'l J. Computer Science and Network Security, vol. 9, no. 9, Sept. 2009.
    • (2009) Int'l J. Computer Science and Network Security , vol.9 , Issue.9
    • Zargar, P.B.1    Kabiri, G.R.A.2
  • 6
    • 70349107731 scopus 로고    scopus 로고
    • Passice data link layer 802.11 wireless device driver fingerprinting
    • J. Franklin, et al., Passice data link layer 802.11 wireless device driver fingerprinting, in Proc. 2006 USENIX Security Symposium, pp. 1-12.
    • Proc. 2006 USENIX Security Symposium , pp. 1-12
    • Franklin, J.1
  • 8
    • 21944457574 scopus 로고    scopus 로고
    • A comprehensive approach to intrusion detection alert correlation
    • F. Valeur, et al., A comprehensive approach to intrusion detection alert correlation, IEEE Trans. Dependable and Secure Computing, vol. 1, no. 3, pp. 146-169, 2004.
    • (2004) IEEE Trans. Dependable and Secure Computing , vol.1 , Issue.3 , pp. 146-169
    • Valeur, F.1
  • 10
    • 40649085584 scopus 로고    scopus 로고
    • Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods
    • A. Tamilarasan, et al., Feature ranking and selection for intrusion detection using artificial neural networks and statistical methods, in Proc. 2006 International Joint Conference on Neural Networks, pp. 4754-4761.
    • Proc. 2006 International Joint Conference on Neural Networks , pp. 4754-4761
    • Tamilarasan, A.1
  • 11
    • 84880171226 scopus 로고    scopus 로고
    • The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system
    • J. Milliken, et al., The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system, in Proc. 2012 IET Intl. Conf. on Wireless Communications and Applications.
    • Proc. 2012 IET Intl. Conf. on Wireless Communications and Applications
    • Milliken, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.