語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Detection and defense strategies for...
~
Li, Qing.
FindBook
Google Book
Amazon
博客來
Detection and defense strategies for anomalous traffic in wireless networks.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Detection and defense strategies for anomalous traffic in wireless networks./
作者:
Li, Qing.
面頁冊數:
120 p.
附註:
Adviser: Wade Trappe.
Contained By:
Dissertation Abstracts International68-08B.
標題:
Engineering, Electronics and Electrical. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3277303
ISBN:
9780549192619
Detection and defense strategies for anomalous traffic in wireless networks.
Li, Qing.
Detection and defense strategies for anomalous traffic in wireless networks.
- 120 p.
Adviser: Wade Trappe.
Thesis (Ph.D.)--Rutgers The State University of New Jersey - New Brunswick, 2007.
Advancements in wireless technologies will allow users to communicate at any time at anyplace. Not only will wireless networks becomes more available to users, but adversaries will be able to easily obtain wireless devices. Unfortunately, the open nature of the wireless medium and the lack of a well-defined security architecture make wireless networks particularly vulnerable to attacks. In particular, the adversary's ability to inject, modify and drop traffic in a wireless network can facilitate a variety of attacks, and can serve as the basis for conducting denial of service (DoS) attacks.
ISBN: 9780549192619Subjects--Topical Terms:
626636
Engineering, Electronics and Electrical.
Detection and defense strategies for anomalous traffic in wireless networks.
LDR
:03335nam 2200277 a 45
001
948607
005
20110524
008
110524s2007 ||||||||||||||||| ||eng d
020
$a
9780549192619
035
$a
(UMI)AAI3277303
035
$a
AAI3277303
040
$a
UMI
$c
UMI
100
1
$a
Li, Qing.
$3
1002991
245
1 0
$a
Detection and defense strategies for anomalous traffic in wireless networks.
300
$a
120 p.
500
$a
Adviser: Wade Trappe.
500
$a
Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5457.
502
$a
Thesis (Ph.D.)--Rutgers The State University of New Jersey - New Brunswick, 2007.
520
$a
Advancements in wireless technologies will allow users to communicate at any time at anyplace. Not only will wireless networks becomes more available to users, but adversaries will be able to easily obtain wireless devices. Unfortunately, the open nature of the wireless medium and the lack of a well-defined security architecture make wireless networks particularly vulnerable to attacks. In particular, the adversary's ability to inject, modify and drop traffic in a wireless network can facilitate a variety of attacks, and can serve as the basis for conducting denial of service (DoS) attacks.
520
$a
In this dissertation, we have studied methods for coping with several forms of attacks in wireless networks that involve the injection of traffic, and which can lead to denial of service attacks. Specifically, we have examined issues related to: protecting multicast traffic by developing authentication technologies that are resistant to flooding-style DoS attacks; detecting device spoofing in wireless networks and the corresponding anomalous traffic that ensues; and the disruption of routing in wireless ad hoc networks. Our solution to multicast flooding DoS includes an improved authentication scheme, which we call Staggered TESLA, that still employs the delayed key disclosure principle, but achieves resilience to DoS and provides multi-level security for multicast applications. In order to address spoofing, we have introduced a framework for detecting anomalous traffic that is based upon forge-resistant relationships. Investigations have shown that it is possible to create these relationships by introducing fields into packets, or by using the intrinsic properties associated with the transmission and reception of packets. These relationships can be further used to construct classifiers that provide multi-level threat assessment. We have addressed routing disruption attacks in wireless ad hoc networks by introducing a new secure routing protocol that efficiently utilizes authentication fields in routing messages. In particular, the protocol we have developed, which we call SEAR (the Secure Efficient Ad hoc on-demand Routing protocol), primarily uses symmetric cryptography and requires asymmetric cryptography only for the initial bootstrap. Compared to existing secure AODV routing protocols, which utilize expensive public key cryptography, SEAR provides better security with significantly less overheads.
590
$a
School code: 0190.
650
4
$a
Engineering, Electronics and Electrical.
$3
626636
690
$a
0544
710
2
$a
Rutgers The State University of New Jersey - New Brunswick.
$3
1017590
773
0
$t
Dissertation Abstracts International
$g
68-08B.
790
$a
0190
790
1 0
$a
Trappe, Wade,
$e
advisor
791
$a
Ph.D.
792
$a
2007
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3277303
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9116333
電子資源
11.線上閱覽_V
電子書
EB W9116333
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入