Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-79232-1_23
|View full text |Cite
|
Sign up to set email alerts
|

Malware in IEEE 802.11 Wireless Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…In spite of this, the wireless medium is still a relatively limited resource, especially when under attack, for example, during a wireless jamming attack where adaptive rate control techniques react to poor channel quality and can significantly reduce transmission rates [11]. Stone-Gross et al [26] conducted an analysis of wireless network performance in the presence of an ICMP ping sweep (Worm propagation behaviour) and a TCP SYN attack. They found that in the presence of this malicious behaviour, utilisation of the network was close to 100%, at peak times of viral activity 50% of the traffic sent were retransmissions, and the average TCP RTT climbed by over 50%.…”
Section: Diverse Resource Availabilitymentioning
confidence: 99%
See 2 more Smart Citations
“…In spite of this, the wireless medium is still a relatively limited resource, especially when under attack, for example, during a wireless jamming attack where adaptive rate control techniques react to poor channel quality and can significantly reduce transmission rates [11]. Stone-Gross et al [26] conducted an analysis of wireless network performance in the presence of an ICMP ping sweep (Worm propagation behaviour) and a TCP SYN attack. They found that in the presence of this malicious behaviour, utilisation of the network was close to 100%, at peak times of viral activity 50% of the traffic sent were retransmissions, and the average TCP RTT climbed by over 50%.…”
Section: Diverse Resource Availabilitymentioning
confidence: 99%
“…These alerts may be from multiple sources, enabling a network-wide perspective. Heuristics have been used extensively to identify malware, based on anomalies in traffic patterns [10,26]. By just examining data from packet headers, the overhead of such procedures can be kept low.…”
Section: Attack Characterisation Componentsmentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, NATs and firewalls may be consuming a third more resources than necessary for keeping track of flows. And in wireless environments, which are gradually becoming ubiquitous both inside the enterprise and as a means of connecting to the enterprise from outside, failed flows may be causing unnecessary channel contention [16] leading to poor application layer performance, and increased costs under metered pricing (e.g. on cellular networks).…”
Section: Introductionmentioning
confidence: 99%
“…For instance, as the media in wireless networks is common, bandwidth is severely limited. The increased rate of attempts to access the media by infected nodes can jam the media and thereby disrupt network functionalities [7]. The dimensions of the threat become more alarming when we consider the huge investments that have been directed towards wireless communication infrastructure and the economic liability that is built upon it.…”
Section: Introductionmentioning
confidence: 99%