Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC
暂无分享,去创建一个
[1] Chun Zhang,et al. Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup? , 2008, Comput. Networks.
[2] Konstantina Papagiannaki,et al. Detecting 802.11 Wireless Hosts from Remote Passive Observations , 2007, Networking.
[3] Donald F. Towsley,et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.
[4] Periklis Chatzimisios,et al. Packet delay analysis of IEEE 802.11 MAC protocol , 2003 .
[5] Raheem A. Beyah,et al. Rogue access point detection using temporal traffic characteristics , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[6] S. Srilasak,et al. Integrated Wireless Rogue Access Point Detection and Counterattack System , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[7] A. Girotra,et al. Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .
[8] V. Vitsas,et al. Throughput and delay analysis of IEEE 802.11 protocol , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.
[9] B. Bing. Measured performance of the IEEE 802.11 wireless LAN , 1999, Proceedings 24th Conference on Local Computer Networks. LCN'99.
[10] Raheem A. Beyah,et al. A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[11] Raheem A. Beyah,et al. A Passive Approach to Wireless NIC Identification , 2006, 2006 IEEE International Conference on Communications.
[12] Alec Wolman,et al. Enhancing the security of corporate Wi-Fi networks using DAIR , 2006, MobiSys '06.
[13] Vasilis Friderikos,et al. Cross-Layer Optimization to Maximize Fairness Among TCP Flows of Different TCP Flavors , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[14] David A. Cieslak,et al. RIPPS: Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning , 2008, TSEC.
[15] Sachin Shetty,et al. Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[16] Xiuzhen Cheng,et al. A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[17] TowsleyDon,et al. Classification of access network types , 2008 .
[18] Byrav Ramamurthy,et al. Agent based intrusion detection and response system for wireless LANs , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[19] Donald F. Towsley,et al. Identifying 802.11 Traffic from Passive Measurements Using Iterative Bayesian Inference , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[20] Ivan Marsic,et al. Fuzzy Reasoning for Wireless Awareness , 2001, Int. J. Wirel. Inf. Networks.