+

OLADIPO et al., 2017 - Google Patents

A Secure Wireless Intrusion Detection System (JBWIDS)

OLADIPO et al., 2017

View PDF
Document ID
6415188608372386142
Author
OLADIPO I
Taiwo A
Babatunde A
Publication year
Publication venue
Ilorin Journal of Computer Science and Information Technology

External Links

Snippet

Abstract The advent of Wireless Local Area Networks (WLANs), has opened many organisations into new IT security threats, and many traditional countermeasures are becoming ineffective in dealing with them. Intrusion Prevention such as encryption …
Continue reading at iljcsit.com.ng (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication

Similar Documents

Publication Publication Date Title
EP2068525B1 (en) Method and system for providing wireless vulnerability management for local area computer networks
Sobh Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
US7086089B2 (en) Systems and methods for network security
US7058796B2 (en) Method and system for actively defending a wireless LAN against attacks
US7277404B2 (en) System and method for sensing wireless LAN activity
US20040255167A1 (en) Method and system for remote network security management
Choi et al. Wireless network security: Vulnerabilities, threats and countermeasures
US20070189194A1 (en) Method and System for Wireless LAN Dynamic Channel Change with Honeypot Trap
US20030217283A1 (en) Method and system for encrypted network management and intrusion detection
US20060123133A1 (en) Detecting unauthorized wireless devices on a wired network
EP3422665B1 (en) Sensor-based wireless network vulnerability detection
US20040203764A1 (en) Methods and systems for identifying nodes and mapping their locations
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Agrawal et al. The performance analysis of honeypot based intrusion detection system for wireless network
CA2486519C (en) System and method for making managing wireless network activity
Hadi et al. BoDMitM: Botnet detection and mitigation system for home router base on MUD
Jeremiah Intrusion detection system to enhance network security using raspberry pi honeypot in kali linux
OLADIPO et al. A Secure Wireless Intrusion Detection System (JBWIDS)
Sheikh Wireless and Intrusion Detection System Network Security
Cardoso et al. Security vulnerabilities and exposures in internet systems and services
Kamal et al. Analysis of network communication attacks
Razak et al. A Preliminary Analysis of Bluetooth and Wi-Fi Security in Residential IoT Ecosystems
Helling Home network security
Pudney An investigation into the unauthorised use of 802.11 wireless local area networks wireless local area networks
Krishnan et al. Control Access Security: Wireless LAN Auditing Framework
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载