2009 First International Conference on Networks &Amp; Communications 2009
DOI: 10.1109/netcom.2009.75
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Method of Detecting Spoofed Attack in Wireless LAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…On the contrary, IPS can be used to alarm for the attacks within a network and provide a platform for acting on attack preventive with Firewall and IDS function mechanism. In comparison to IDS and IPS with features of both depicted in [15,16].…”
Section: Fig 1 Evolution Of Intrusion Prevention Systemmentioning
confidence: 99%
“…On the contrary, IPS can be used to alarm for the attacks within a network and provide a platform for acting on attack preventive with Firewall and IDS function mechanism. In comparison to IDS and IPS with features of both depicted in [15,16].…”
Section: Fig 1 Evolution Of Intrusion Prevention Systemmentioning
confidence: 99%
“…The secret is to attenuate your exposure to attacks [6,7,8]. As a result, the comprehensiveness of protection provided by AN intrusion detection and interference system is crucial to its ability to assist organizations maintain a suitable risk level [9]. The answer should support a broad vary of protocols and defend against a various set of attack varieties to supply price.…”
Section: Literature Reviewmentioning
confidence: 99%
“…[12] utilise a combination of window of sequence numbers and traffic inter-arrival statistics (FRRForge Resistance Relationship Method) to detect spoofing and anomalous traffic in wireless networks. [1] argue that these solutions work only when both the attacker and victim are transmitting and, also may be difficult to differentiate an attacker from a victim, when the victim is offline. They improved [12] solution by utilising transmission rate and by sending a probe request after every 9th frame.…”
Section: Related Workmentioning
confidence: 99%
“…However, many risks remain unmanaged [1]. IEEE 802.11 is a set of standards specified by Institute of Electrical and Electronic Engineers (IEEE) for WLAN computer communication.…”
Section: Introductionmentioning
confidence: 99%