OLADIPO et al., 2017 - Google Patents
A Secure Wireless Intrusion Detection System (JBWIDS)OLADIPO et al., 2017
View PDF- Document ID
- 6415188608372386142
- Author
- OLADIPO I
- Taiwo A
- Babatunde A
- Publication year
- Publication venue
- Ilorin Journal of Computer Science and Information Technology
External Links
Snippet
Abstract The advent of Wireless Local Area Networks (WLANs), has opened many organisations into new IT security threats, and many traditional countermeasures are becoming ineffective in dealing with them. Intrusion Prevention such as encryption …
- 238000001514 detection method 0 title description 58
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2068525B1 (en) | Method and system for providing wireless vulnerability management for local area computer networks | |
| Sobh | Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art | |
| US7086089B2 (en) | Systems and methods for network security | |
| US7058796B2 (en) | Method and system for actively defending a wireless LAN against attacks | |
| US7277404B2 (en) | System and method for sensing wireless LAN activity | |
| US20040255167A1 (en) | Method and system for remote network security management | |
| Choi et al. | Wireless network security: Vulnerabilities, threats and countermeasures | |
| US20070189194A1 (en) | Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap | |
| US20030217283A1 (en) | Method and system for encrypted network management and intrusion detection | |
| US20060123133A1 (en) | Detecting unauthorized wireless devices on a wired network | |
| EP3422665B1 (en) | Sensor-based wireless network vulnerability detection | |
| US20040203764A1 (en) | Methods and systems for identifying nodes and mapping their locations | |
| Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
| Agrawal et al. | The performance analysis of honeypot based intrusion detection system for wireless network | |
| CA2486519C (en) | System and method for making managing wireless network activity | |
| Hadi et al. | BoDMitM: Botnet detection and mitigation system for home router base on MUD | |
| Jeremiah | Intrusion detection system to enhance network security using raspberry pi honeypot in kali linux | |
| OLADIPO et al. | A Secure Wireless Intrusion Detection System (JBWIDS) | |
| Sheikh | Wireless and Intrusion Detection System Network Security | |
| Cardoso et al. | Security vulnerabilities and exposures in internet systems and services | |
| Kamal et al. | Analysis of network communication attacks | |
| Razak et al. | A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems | |
| Helling | Home network security | |
| Pudney | An investigation into the unauthorised use of 802.11 wireless local area networks wireless local area networks | |
| Krishnan et al. | Control Access Security: Wireless LAN Auditing Framework |