Intrusion Detection Methods in Wireless Network Systems

The main purpose of this paper is to demonstrate the security weaknesses found in existing wireless networks. It demonstrates the basic principles of different security algorithms, and sketches up the ways how the attacker tries to break them. Protecting the network against unauthorized access is a...

Full description

Saved in:
Bibliographic Details
Published inJournal of Electrical and Electronics Engineering Vol. 4; no. 1; p. 79
Main Authors Krekán, Ján, Dobos, L'ubomír, Papaj, Ján
Format Journal Article
LanguageEnglish
Published Oradea University of Oradea 01.01.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The main purpose of this paper is to demonstrate the security weaknesses found in existing wireless networks. It demonstrates the basic principles of different security algorithms, and sketches up the ways how the attacker tries to break them. Protecting the network against unauthorized access is a very significant part of the subject, but securing the network against dangerous activities of already authorized clients is very crucial too. This article also tries to discuss several methods and proposals for implementing a new model of monitoring the wireless networks. The aim of this monitoring is to allow system administrators to limit access to the network for users who are trying to break the security rules given by the network administrator. [PUBLICATION ABSTRACT]
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-2
content type line 23
ISSN:1844-6035
2067-2128