Measuring Accuracy in Identifying and Detecting Unauthorized Access Point using Proactive Intrusion Detection Approach in Wireless Networks
暂无分享,去创建一个
[1] Guanlin Chen,et al. An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition , 2010, 2010 Second International Conference on Future Networks.
[2] Jie Wang,et al. Detecting protected layer-3 rogue APs , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).
[3] Bo Sheng,et al. A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.
[4] Sachin Shetty,et al. Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[5] Günter Schäfer,et al. Security in fixed and wireless networks - an introduction to securing data communications , 2004 .
[6] Srinivas Sampalli,et al. Client-based intrusion prevention system for 802.11 wireless LANs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[7] Xiuzhen Cheng,et al. A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[8] Hu Zhengbing,et al. Study of Intrusion Detection Systems (IDSs) in Network Security , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[10] John S. Baras,et al. A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[11] Bo Sheng,et al. A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.
[12] R Schmoyer Timothy,et al. Wireless intrusion detection and response : A case study using the classic man-in-the-middle attack , 2004 .
[13] Wenyong Weng,et al. An overview of wireless intrusion prevention systems , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.
[14] S. Srilasak,et al. Integrated Wireless Rogue Access Point Detection and Counterattack System , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[15] Raheem A. Beyah,et al. A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[16] Donald F. Towsley,et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.
[17] Jack Timofte. Wireless Intrusion Prevention Systems , 2008 .
[18] Guanlin Chen,et al. Research of wireless intrusion prevention systems based on plan recognition and honeypot , 2009, 2009 International Conference on Wireless Communications & Signal Processing.