Anto et al., 2012 - Google Patents
A survey on DoS attacks and detection schemes in wireless mesh NetworksAnto et al., 2012
View PDF- Document ID
- 4051830219643255526
- Author
- Anto S
- Seetha S
- Kuriakose R
- Publication year
- Publication venue
- Procedia engineering
External Links
Snippet
A Wireless mesh network is a dynamically self-organized, self-configured, multi-hop wireless network. The WMNs provides wireless services for a variety of applications in personal, local, campus and metropolitan areas. The important application scenarios provided by …
- 238000001514 detection method 0 title description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0254—Stateful filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hussain et al. | SYN flood attack detection based on bayes estimator (SFADBE) for MANET | |
Gu et al. | Denial of service attacks | |
Thamilarasu et al. | A cross-layer based intrusion detection approach for wireless ad hoc networks | |
Liu et al. | FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs | |
Seth et al. | Denial of service attacks and detection methods in wireless mesh networks | |
Bhatia et al. | Security issues in MANET: a survey on attacks and defense mechanisms | |
Xiang et al. | mitigating DDOS attacks using protection nodes in mobile Ad hoc networks | |
Gao et al. | Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests | |
Vani et al. | Providing of secure routing against attacks in manets | |
Singh et al. | An assessment of frequently adopted unsecure patterns in mobile ad hoc network: Requirement and security management perspective | |
Gokhale et al. | Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks | |
Anto et al. | A survey on DoS attacks and detection schemes in wireless mesh Networks | |
Sawant et al. | Survey of DOS flooding attacks over MANET environment | |
Arockiam et al. | Security algorithms to prevent Denial of Service (DoS) attacks in WLAN | |
Saha et al. | A review on attacks and secure routing protocols in MANET | |
Salem et al. | Efficient mechanism for mitigating multiple black hole attacks in MANETs | |
Panda et al. | MANET routing attacks and their countermeasures: A survey | |
Aswal et al. | Threats and vulnerabilities in wireless mesh networks | |
Tiwari et al. | Collaborative decision for wormhole attack prevention in WSN | |
Dey et al. | Different routing threats and its mitigations schemes for mobile ad-hoc networks (MANETs)–A review | |
Soomro et al. | Denial of service attacks in wireless ad hoc networks | |
Tyagi et al. | A survey of different dos attacks on wireless network | |
Jingle et al. | Distributed detection of DoS using clock values in wireless broadband networks | |
Anto et al. | A Survey on DoS Attacks and Detection | |
Jingle et al. | Defending IP spoofing attack and TCP SYN flooding attack in next generation multi-hop wireless networks |