نتایج جستجو برای: wids

تعداد نتایج: 31  

2004
Craig Valli

The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...

Journal: :Journal of cyber security and mobility 2021

HTTP injection attacks are well known cyber security threats with fatal consequences. These initiated by malicious entities (either human or computer) send dangerous unsafe contents into the parameters of requests. Combatting demands for development Web Intrusion Detection Systems (WIDS). Common WIDS follow a rule-based approach signature-based which have common problem high false-positive rate...

2012
Khalid Nasr Anas Abou El Kalam Christian Fraboul

Wireless network security has a considerable attention in recent years. Several security efforts have been exerted to combat the wireless attacks, but unfortunately complete attack prevention at the first line of defense such as authentication, encryption, and firewall is not realistically attainable. Thus, the emphasis on detecting wireless attacks at a second line of defense, in the form of W...

2014
Md. Waliullah Diane Gan

Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. This paper discusses the vari...

Journal: :journal of advances in computer research 2013
s.mobarakeh moosavirad peyman kabiri hamidreza mahini

intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...

2004
Ajith Abraham Sugata Sanyal Lakhmi Jain

The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data wit...

2001
PATRICK W. JORDAN LAUREN A. PEACOCK DOMINIK CHMIELEWSKI SCOTT JENSON

This paper examines concepts behind people’s personal data organization, and considers the idea that new technologies support us in remaining, or becoming, disorganized. Examples are given of three technologies which support various forms of disorganized behavior. A study, designed to investigate the ways in which people store and access personal data, is then summarized. Results suggested cons...

2007
Alexandros Tsakountakis Georgios Kambourakis Stefanos Gritzalis

Robust Security Network (RSN) epitomised by IEEE 802.11i substandard is promising what it stands for; robust and effective protection for mission critical Wireless Local Area Networks (WLAN). However, despite the fact that 802.11i overhauls the IEEE's 802.11 security standard several weaknesses still remain. In this context, the complementary assistance of Wireless Intrusion Detection Systems (...

2011
Sushama Shirke S. B. Vanjale

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

Journal: :EAI Endorsed Trans. Ubiquitous Environments 2015
Stefano Marchesani Luigi Pomante Marco Pugliese Fortunato Santucci

Recent years have seen the growth of interest for middleware (MW) approaches in resource-constrained systems like Wireless Sensor Networks (WSNs). In this context, available MW platforms usually provide an Application Layer with different basic services, but do not provide security services such as secure links management or intrusion detection. Nevertheless, since WSN applications normally req...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید