Defending against wireless network intrusion
نویسندگان
چکیده
منابع مشابه
Defending against network IDS evasion
Vern Paxson received his M.S. and Ph.D. degrees from the University of California, Berkeley. He is a Senior Scientist at the AT&T Center for Internet Research at the International Computer Science Institute, and also a Staff Scientist at the Lawrence Berkeley National Laboratory. His research focuses on network intrusion detection and Internet measurement. He is one of the Transport Area Direct...
متن کاملDatabase Intrusion Detection: Defending Against the Insider Threat
Not only are Databases an integral and critical part of many information systems, they are critical information assets to many business enterprises. However, the network and host intrusion detection systems most enterprises use to detect attacks against their information systems cannot detect transaction-level attacks against databases. Transaction-level attacks often come from authorized users...
متن کاملDefending Against Path-Based Denial of Service Attack in Wireless Sensor Network
WNS are significantly different from the traditional network architecture due to its wireless communication, energy limitation, and computation constraint and environment of the application. Because of these differences, security becomes a critical issue. The path-based denial of service (PDoS) attacks harm the network maintenance and cause serious damage in the resource constrained WSNs. In a ...
متن کاملDefending Against Nodes Replication Attacks on Wireless Sensor Networks
Wireless Sensor Networks (WSN) are subject to several kind of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are o...
متن کاملDefending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addressed, and maintaining strong cache consistency is desired in some strategic scenarios (e.g., battlefields). In these situations, the invalidation-based approach is preferred due to its low overhead. However, this approa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Computer and System Sciences
سال: 2014
ISSN: 0022-0000
DOI: 10.1016/j.jcss.2013.06.006