Nothing Special   »   [go: up one dir, main page]

Anto et al., 2012 - Google Patents

A survey on DoS attacks and detection schemes in wireless mesh Networks

Anto et al., 2012

View PDF
Document ID
4051830219643255526
Author
Anto S
Seetha S
Kuriakose R
Publication year
Publication venue
Procedia engineering

External Links

Snippet

A Wireless mesh network is a dynamically self-organized, self-configured, multi-hop wireless network. The WMNs provides wireless services for a variety of applications in personal, local, campus and metropolitan areas. The important application scenarios provided by …
Continue reading at www.sciencedirect.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Similar Documents

Publication Publication Date Title
Hussain et al. SYN flood attack detection based on bayes estimator (SFADBE) for MANET
Gu et al. Denial of service attacks
Thamilarasu et al. A cross-layer based intrusion detection approach for wireless ad hoc networks
Liu et al. FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs
Seth et al. Denial of service attacks and detection methods in wireless mesh networks
Bhatia et al. Security issues in MANET: a survey on attacks and defense mechanisms
Xiang et al. mitigating DDOS attacks using protection nodes in mobile Ad hoc networks
Gao et al. Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests
Vani et al. Providing of secure routing against attacks in manets
Singh et al. An assessment of frequently adopted unsecure patterns in mobile ad hoc network: Requirement and security management perspective
Gokhale et al. Classification of attacks on wireless mobile ad hoc networks and vehicular ad hoc networks
Anto et al. A survey on DoS attacks and detection schemes in wireless mesh Networks
Sawant et al. Survey of DOS flooding attacks over MANET environment
Arockiam et al. Security algorithms to prevent Denial of Service (DoS) attacks in WLAN
Saha et al. A review on attacks and secure routing protocols in MANET
Salem et al. Efficient mechanism for mitigating multiple black hole attacks in MANETs
Panda et al. MANET routing attacks and their countermeasures: A survey
Aswal et al. Threats and vulnerabilities in wireless mesh networks
Tiwari et al. Collaborative decision for wormhole attack prevention in WSN
Dey et al. Different routing threats and its mitigations schemes for mobile ad-hoc networks (MANETs)–A review
Soomro et al. Denial of service attacks in wireless ad hoc networks
Tyagi et al. A survey of different dos attacks on wireless network
Jingle et al. Distributed detection of DoS using clock values in wireless broadband networks
Anto et al. A Survey on DoS Attacks and Detection
Jingle et al. Defending IP spoofing attack and TCP SYN flooding attack in next generation multi-hop wireless networks