نتایج جستجو برای: wids
تعداد نتایج: 31 فیلتر نتایج به سال:
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...
HTTP injection attacks are well known cyber security threats with fatal consequences. These initiated by malicious entities (either human or computer) send dangerous unsafe contents into the parameters of requests. Combatting demands for development Web Intrusion Detection Systems (WIDS). Common WIDS follow a rule-based approach signature-based which have common problem high false-positive rate...
Wireless network security has a considerable attention in recent years. Several security efforts have been exerted to combat the wireless attacks, but unfortunately complete attack prevention at the first line of defense such as authentication, encryption, and firewall is not realistically attainable. Thus, the emphasis on detecting wireless attacks at a second line of defense, in the form of W...
Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. This paper discusses the vari...
intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...
The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication technology being essential and vital components of Government facilities, power plant systems, medical infrastructures, financial centres and military installations to name a few. Finding effective ways to protect information systems, networks and sensitive data wit...
This paper examines concepts behind people’s personal data organization, and considers the idea that new technologies support us in remaining, or becoming, disorganized. Examples are given of three technologies which support various forms of disorganized behavior. A study, designed to investigate the ways in which people store and access personal data, is then summarized. Results suggested cons...
Robust Security Network (RSN) epitomised by IEEE 802.11i substandard is promising what it stands for; robust and effective protection for mission critical Wireless Local Area Networks (WLAN). However, despite the fact that 802.11i overhauls the IEEE's 802.11 security standard several weaknesses still remain. In this context, the complementary assistance of Wireless Intrusion Detection Systems (...
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
Recent years have seen the growth of interest for middleware (MW) approaches in resource-constrained systems like Wireless Sensor Networks (WSNs). In this context, available MW platforms usually provide an Application Layer with different basic services, but do not provide security services such as secure links management or intrusion detection. Nevertheless, since WSN applications normally req...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید