Wireless intrusion detection and response

作者: Y.-X. Lim , T.S. Yer , J. Levine , H.L. Owen

DOI: 10.1109/SMCSIA.2003.1232403

关键词:

摘要: A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf access point was modified by downloading new Linux operating with nonstandard functionality in order to implement that has ability actively respond identified threats. overview characteristics required presented along review comparison existing systems functionalities. Implemented capabilities our prototyped are conclusions as what necessary more desirable capable system.

参考文章(4)
Scott Fluhrer, Itsik Mantin, Adi Shamir, Weaknesses in the Key Scheduling Algorithm of RC4 selected areas in cryptography. pp. 1- 24 ,(2001) , 10.1007/3-540-45537-X_1
Mike Loukides, Matthew S. Gast, 802.11 Wireless Networks: The Definitive Guide ,(2002)
Nikita Borisov, Ian Goldberg, David Wagner, Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking - MobiCom '01. pp. 180- 189 ,(2001) , 10.1145/381677.381695