A Survey of Denial of Service Attacks and it’s Countermeasures on Wireless Network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 5
Abstract
Wireless networks are popular among the Laptop user community today because of the mobility and ease of use. People working through wireless connection must be aware of the surroundings due to the various types of attacks made by the intruders. One of the major attacks in wireless 802.11 WLANs is Denial of Service attack (DoS). Even though the users protect their systems with Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) security protocols, DoS attack is still prevalent. This paper makes a survey on different types of DoS attacks and their countermeasures on the infrastructure networks which are based on the Access Points (AP). In this paper, the main attacks called eauthentication and Disassociation Flooding DoS attacks are studied through experiments and the possible solutions are recommended. This paper also studies the vulnerabilities due to rogue access point, null data frames and Access Points. The various solutions suggested for this problem like Pseudo randomized sequence number based solution to 802.11 disassociation, Pseudo random number based authentication to counter DoS, Dual authentication for fast handoff in IEEE 802.11 and Letter Envelop Protocol as a light weight solution are studied and reported.
Authors and Affiliations
Arockiam. L , Vani. B
A Survey on Optimistic Fair Digital Signature Exchange Protocols
Security services become crucial to many applications such as e-commerce payment protocols, electronic contract signing, and certified e-mail delivery, with the phenomenal growth of the Internet and open networks. For th...
Locating ATMs in Urban Areas
In recent years, the banks and financial institutions have considerably attempted to provide better and more varied services to the customers. These varied services may satisfy needs of different group of customers. In t...
A Novel Biometric system for Person Recognition Using Palm vein Images
The palm vein is one of the most reliable physiological characteristics that can be used to distinguish between individuals. In recent years, it receives more attention from the researchers. In this paper, we present a n...
Extraction of Radiology Reports using Text mining
In this paper, we propose a text mining system to extract and use the information in radiology reports. The system consists of three main modules: medical finding extractor, report and image retriever. The medical findin...
A Classification Technique for Microarray Gene Expression Data using PSO-FLANN
Despite of an increased global effort to end breast cancer, it continues to be most common cancer deaths in women. This problem reminds that new therapeutic approaches are desperately needed to improve patient survival r...