Treffer: Detailed DoS attacks in wireless networks and countermeasures
Title:
Detailed DoS attacks in wireless networks and countermeasures
Authors:
Source:
International journal of ad hoc and ubiquitous computing (Print). 2(3):157-166
Publisher Information:
Genève: Inderscience Enterprises, 2007.
Publication Year:
2007
Physical Description:
print, 3/4 p
Original Material:
INIST-CNRS
Subject Terms:
Computer science, Informatique, Telecommunications, Télécommunications, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Organisation des mémoires. Traitement des données, Memory organisation. Data processing, Gestion des mémoires et des fichiers (y compris la protection et la sécurité des fichiers), Memory and file management (including protection and security), Contre mesure électronique, Electronic countermeasure, Contra medida electrónica, Déni service, Denial of service, Denegación de servicio, Réseau neuronal flou, Fuzzy neural nets, Système information, Information system, Sistema información, Système réparti, Distributed system, Sistema repartido, Sécurité informatique, Computer security, Seguridad informatica, Réseau sans fil, Wireless network, Red sin hilo, DoS attacks, countermeasures, wireless network vulnerabilities
Document Type:
Konferenz
Conference Paper
File Description:
text
Language:
English
Author Affiliations:
Information Security Research (iSECURES) Lab, Swinburne University of Technology (Sarawak), 93576 Kuching, Malaysia
ISSN:
1743-8225
Rights:
Copyright 2007 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.18589742
Database:
PASCAL Archive
Weitere Informationen
IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.