Enhancement of Passive MAC Spoofing Detection Techniques
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2010, Vol 1, Issue 5
Abstract
Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) attacks. The two techniques are the Received Signal Strength Detection Technique (RSSDT) and Round Trip Time Detection Technique (RTTDT). Two sets of experiments were done to evaluate the proposed algorithm. Absence of any false negatives and low number of false positives in all experiments demonstrated the effectiveness of these techniques
Authors and Affiliations
Aiman Abu Samra , Ramzi Abed
Modeling Access Control Policy of a Social Network
Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the maj...
Design and Implementation for Multi-Level Cell Flash Memory Storage Systems
The flash memory management functions of write coalescing, space management, logical-to-physical mapping, wear leveling, and garbage collection require significant on-going computation and data movement. MLC flash memory...
Evaluating the Impact of Critical Factors in Agile Continuous Delivery Process: A System Dynamics Approach
Continuous Delivery is aimed at the frequent delivery of good quality software in a speedy, reliable and efficient fashion – with strong emphasis on automation and team collaboration. However, even with this new paradigm...
Prediction of Mental Health Problems Among Children Using Machine Learning Techniques
Early diagnosis of mental health problems helps the professionals to treat it at an earlier stage and improves the patients’ quality of life. So, there is an urgent need to treat basic mental health problems that prevail...
Evaluation of Different Hypervisors Performance in the Private Cloud with SIGAR Framework
To make cloud computing model Practical and to have essential characters like rapid elasticity, resource pooling, on demand access and measured service, two prominent technologies are required. One is internet and second...