期刊论文详细信息
International Journal of Computer Science and Security
Detecting and Localizing Wireless Network Attacks Techniques
Iyad Aldasouqi1  Walid Salameh1 
[1] $$
关键词: Security;    Sensors;    wireless;    Authentication;    Access points;   
DOI  :  
来源: Computer Science and Security
PDF
【 摘 要 】

In order to increase employee productivity within a feasible budget, we have to track new technologies, investigate and choose the best plan and implementation of these technologies. WLAN is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications.This paper will discuss some techniques and approaches which can help to detect, localize and identify wireless network attacks, which present a unique set of challenges to IT and security professionals. All efforts were focusing on the ability to identity based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple illegitimate identities. Also, to be sure that the network is able to robustly identify each transmitter independently of packet contents, allowing detection of a large class of identity-based attacks with high probability.The attacker can listen to all wireless traffic, compromise encryption and Use attenuators, amplifiers, directional antennas, software radios, but he cannot be at the location of user or at the location of access points. However, we have to choose the best design, implementation, and evaluation techniques in order to secure our network from attackers, where our choice will depend on a technical implementation to mitigate the risk on the enterprise network infrastructure.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201912040511491ZK.pdf 507KB PDF download
  文献评价指标  
  下载次数:14次 浏览次数:17次