A Survey of Denial of Service Attacks and it’s Countermeasures on Wireless Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Wireless networks are popular among the Laptop user community today because of the mobility and ease of use. People working through wireless connection must be aware of the surroundings due to the various types of attacks made by the intruders. One of the major attacks in wireless 802.11 WLANs is Denial of Service attack (DoS). Even though the users protect their systems with Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) security protocols, DoS attack is still prevalent. This paper makes a survey on different types of DoS attacks and their countermeasures on the infrastructure networks which are based on the Access Points (AP). In this paper, the main attacks called eauthentication and Disassociation Flooding DoS attacks are studied through experiments and the possible solutions are recommended. This paper also studies the vulnerabilities due to rogue access point, null data frames and Access Points. The various solutions suggested for this problem like Pseudo randomized sequence number based solution to 802.11 disassociation, Pseudo random number based authentication to counter DoS, Dual authentication for fast handoff in IEEE 802.11 and Letter Envelop Protocol as a light weight solution are studied and reported.
Authors and Affiliations
Arockiam. L , Vani. B
IMPROVED ROUND ROBIN POLICY A MATHEMATICAL APPROACH
This work attempts to mathematically formulize the computation of waiting time of any process in a static -process, CPU-bound round robin scheme. That in effect, can calculate other performance measures also. An improv...
Towards a participatory E-learning 2.0<br /> A new E-learning focused on learners and validation of the content
Our aim is to propose a collaborative methodological approach centred on learners and based on the Web 2.0 tools in order to make E-learning 2.0. It is based on a process consisting of four iterative steps which are: gro...
A VIEW ON SECURE ROUTING IN ADHOC NETWORKS
In our proposed research work different security attacks from the perspective of layer approach are identified. The impacts of security attacks on each layer are studied. Then we focus on security attacks on network laye...
A survey on Data Storage and Retrieval in Cloud Computing
This paper presents the survey on data storage and retrieval in cloud computing. In this paper the study on scope and security issues related to data storage and information retrieval in cloud computing is done. Data sto...
A Study of Image Segmentation and Edge Detection Techniques
Image segmentation is the key behind image understanding. Image segmentation is one of the most important steps leading to the analysis of processed image data. It is the prime area of research in computer vision. A numb...