Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 2 - Volume 2
The Implementation of a Proactive Wireless Intrusion Detection System
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
A Clustering Approach to Wireless Network Intrusion Detection
ICTAI '05 Proceedings of the 17th IEEE International Conference on Tools with Artificial Intelligence
Intrusion Detection in Wireless Networks using Clustering
ICMLA '05 Proceedings of the Fourth International Conference on Machine Learning and Applications
A Wireless Distributed Intrusion Detection System and a New Attack Model
ISCC '06 Proceedings of the 11th IEEE Symposium on Computers and Communications
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Lightweight wireless intrusion detection systems against DDoS attack
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience
IEEE Communications Magazine
Hi-index | 0.00 |
Robust Security Network (RSN) epitomised by IEEE 802.11i substandard is promising what it stands for; robust and effective protection for mission critical Wireless Local Area Networks (WLAN). However, despite the fact that 802.11i overhauls the IEEE's 802.11 security standard several weaknesses still remain. In this context, the complementary assistance of Wireless Intrusion Detection Systems (WIDS) to deal with existing and new threats is greatly appreciated. In this paper we focus on 802.11i intrusion detection, discuss what is missing, what the possibilities are, and experimentally explore ways to make them intertwine and co-work. Our experiments employing well known open source attack tools and custom made software reveal that most 802.11i specific attacks can be effectively recognised, either directly or indirectly. We also consider and discuss Distributed Wireless Intrusion Detection (DIDS), which seems to fit best in RSN networks.