Abstract | ||
---|---|---|
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propose a distributed intrusion detection system in which each node monitors the traffic flow on the network and collects relevant statistics about it. By combining each node's view we are able to tell if (and which type of) an attack happened or if the channel is just saturated. However, this system opens the possibility for misuse. We discuss the impact of the misuse on the system and the best strategies for each actor. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1109/ISCC.2006.22 | ISCC |
Keywords | Field | DocType |
traffic flow,intrusion detection system,wireless network,best strategy,new attack model,relevant statistic,denial-of-service attack,wireless networks,denial of service attack,quality of service,intrusion detection,bandwidth,authentication,statistical distributions | Wireless network,Host-based intrusion detection system,Attack model,Wireless intrusion prevention system,Authentication,Wireless,Computer security,Computer science,Computer network,Jamming,Intrusion detection system | Conference |
ISBN | Citations | PageRank |
0-7695-2588-1 | 3 | 0.51 |
References | Authors | |
6 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Marco Domenico Aime | 1 | 4 | 1.91 |
Giorgio Calandriello | 2 | 238 | 14.95 |
Antonio Lioy | 3 | 444 | 53.41 |