Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network
暂无分享,去创建一个
[1] Zhiping Jiang,et al. The detection and prevention for ARP Spoofing based on Snort , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[2] Khaled Elleithy,et al. A New MAC Address Spoofing Detection Technique Based on Random Forests , 2016, Sensors.
[3] Minho Park,et al. Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks , 2013, Comput. Networks.
[4] Mohammad Shikh-Bahaei,et al. Cooperative Full-Duplex Physical and MAC Layer Design in Asynchronous Cognitive Networks , 2017, Wirel. Commun. Mob. Comput..
[5] Guangjia Song,et al. Anonymous-address-resolution model , 2016, Frontiers of Information Technology & Electronic Engineering.
[6] Jin Kim. IP Spoofing Detection Technique for Endpoint Security Enhancement , 2017 .
[7] Subir Biswas,et al. AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications , 2017, J. Sensors.
[8] Han-Wei Hsiao,et al. Constructing an ARP attack detection system with SNMP traffic data mining , 2009, ICEC.
[9] Young-Sik Jeong,et al. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments , 2014, TheScientificWorldJournal.
[10] Cheng-Zen Yang,et al. Countermeasures against MAC address spoofing in public wireless networks using lightweight agents , 2010, 2010 The 5th Annual ICST Wireless Internet Conference (WICON).
[11] Yong Sheng,et al. Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] Divya Bansal,et al. Non-cryptographic methods of MAC spoof detection in wireless LAN , 2008, 2008 16th IEEE International Conference on Networks.
[13] Shukor Abd Razak,et al. Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure , 2015 .
[14] Santosh Biswas,et al. Detection of neighbor discovery protocol based attacks in IPv6 network , 2013 .
[15] Prerna Arote,et al. Detection and Prevention against ARP Poisoning Attack Using Modified ICMP and Voting , 2015, 2015 International Conference on Computational Intelligence and Networks.
[16] Mourad Debbabi,et al. Toward Automated MAC Spoofer Investigations , 2014, C3S2E.
[17] Xing Hu,et al. Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol , 2017 .
[18] Kevin R. B. Butler,et al. Securing ARP/NDP From the Ground Up , 2017, IEEE Transactions on Information Forensics and Security.
[19] Archit Agrawal,et al. Detection and prevention of ARP poisoning in dynamic IP configuration , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[20] Yafeng Xu,et al. The study on the college campus network ARP deception defense , 2010, 2010 2nd International Conference on Future Computer and Communication.
[21] Ameer Al-Nemrat,et al. Intelligent detection of MAC spoofing attack in 802.11 network , 2016, ICDCN.
[22] M. Durairaj,et al. ThreV - An Efficacious Algorithm to Thwart MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network , 2014 .
[23] Young-Sik Jeong,et al. RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks , 2014, The Journal of Supercomputing.