“…In this scenario three different experiments were carried out; in the first one, the attacker launched a TKIP DoS Attack [9,18], in the second experiment he launched a Channel Switch DoS attack [14], while in the third experiment the attacker launched a Quite DoS attack [14]. For each experiment, traffic was captured using Wireshark 2 , after that the captured traffic was examined using the IDS Sensor which is based on the correlation engine, which resulted in two alarms.…”