Defending against wireless network intrusion

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending against network IDS evasion

Vern Paxson received his M.S. and Ph.D. degrees from the University of California, Berkeley. He is a Senior Scientist at the AT&T Center for Internet Research at the International Computer Science Institute, and also a Staff Scientist at the Lawrence Berkeley National Laboratory. His research focuses on network intrusion detection and Internet measurement. He is one of the Transport Area Direct...

متن کامل

Database Intrusion Detection: Defending Against the Insider Threat

Not only are Databases an integral and critical part of many information systems, they are critical information assets to many business enterprises. However, the network and host intrusion detection systems most enterprises use to detect attacks against their information systems cannot detect transaction-level attacks against databases. Transaction-level attacks often come from authorized users...

متن کامل

Defending Against Path-Based Denial of Service Attack in Wireless Sensor Network

WNS are significantly different from the traditional network architecture due to its wireless communication, energy limitation, and computation constraint and environment of the application. Because of these differences, security becomes a critical issue. The path-based denial of service (PDoS) attacks harm the network maintenance and cause serious damage in the resource constrained WSNs. In a ...

متن کامل

Defending Against Nodes Replication Attacks on Wireless Sensor Networks

Wireless Sensor Networks (WSN) are subject to several kind of threats and attacks, like eavesdropping, intrusion, battery exhausting, packets reply and nodes compromising. While most of threats can be dealt with them through cryptographic materials provided by key management protocols, some other threats, like nodes replication attacks, can still go undetectable. Nodes replication attacks are o...

متن کامل

Defending against cache consistency attacks in wireless ad hoc networks

Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addressed, and maintaining strong cache consistency is desired in some strategic scenarios (e.g., battlefields). In these situations, the invalidation-based approach is preferred due to its low overhead. However, this approa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer and System Sciences

سال: 2014

ISSN: 0022-0000

DOI: 10.1016/j.jcss.2013.06.006