Detailed DoS attacks in wireless networks and countermeasures

被引:9
|
作者
Mohammed, Lawan A. [1 ]
Issac, Biju [1 ]
机构
[1] Swinburne Univ Technol Sarawak, Informat Secur Res Lab, Kuching 93576, Malaysia
关键词
DoS attacks; countermeasures; wireless network vulnerabilities;
D O I
10.1504/IJAHUC.2007.012417
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [41] Simulation-based analysis of DoS attacks in wireless ad hoc networks
    Hong, SW
    Rhee, SH
    Ryou, JC
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (10): : 2415 - 2418
  • [42] Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey
    Jaitly, Sunakshi
    Malhotra, Harshit
    Bhushan, Bharat
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 559 - 564
  • [43] Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
    Bharat Bhushan
    Gadadhar Sahoo
    Wireless Personal Communications, 2018, 98 : 2037 - 2077
  • [44] Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
    Bhushan, Bharat
    Sahoo, Gadadhar
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) : 2037 - 2077
  • [45] Simulation Analysis of DoS, MITM and CDP Security Attacks and Countermeasures
    Tanceska, Biljana
    Bogdanoski, Mitko
    Risteski, Aleksandar
    FUTURE ACCESS ENABLERS FOR UBIQUITOUS AND INTELLIGENT INFRASTRUCTURES, 2015, 159 : 197 - 203
  • [46] Detecting and mitigating dos attacks in wireless networks without affecting the normal behaving nodes
    Xu, Yi
    Wang, Wenye
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 2506 - 2512
  • [47] PKC-Based DoS Attacks-Resistant Scheme in Wireless Sensor Networks
    Kim, Daehee
    An, Sunshin
    IEEE SENSORS JOURNAL, 2016, 16 (08) : 2217 - 2218
  • [48] CNN-LSTM Based Approach for Dos Attacks Detection in Wireless Sensor Networks
    Salmi, Salim
    Oughdir, Lahcen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (04) : 835 - 842
  • [49] Defending against False-Endorsement-Based DoS Attacks in Wireless Sensor Networks
    Krauss, Christoph
    Schneider, Markus
    Eckert, Claudia
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 13 - 23
  • [50] A localized architecture for detecting denial of service (DoS) attacks in wireless ad hoc networks
    Denko, MK
    Intelligence in Communication Systems, 2005, 190 : 135 - 146