Sciweavers

642 search results - page 3 / 129
» Detecting Spoofed Packets
Sort
View
ICNP
2007
IEEE
14 years 5 months ago
A Poisoning-Resilient TCP Stack
— We treat the problem of large-scale TCP poisoning: an attacker, who is able to monitor TCP packet headers in the network, can deny service to all flows traversing the monitori...
Amit Mondal, Aleksandar Kuzmanovic
IJIPT
2010
147views more  IJIPT 2010»
13 years 9 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
RAID
2005
Springer
14 years 4 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 10 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
INFOCOM
2008
IEEE
14 years 5 months ago
Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength
Yong Sheng, Keren Tan, Guanling Chen, David Kotz, ...