Intrusion Detection Methods in Wireless Network Systems
The main purpose of this paper is to demonstrate the security weaknesses found in existing wireless networks. It demonstrates the basic principles of different security algorithms, and sketches up the ways how the attacker tries to break them. Protecting the network against unauthorized access is a...
Saved in:
Published in | Journal of Electrical and Electronics Engineering Vol. 4; no. 1; p. 79 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Oradea
University of Oradea
01.01.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The main purpose of this paper is to demonstrate the security weaknesses found in existing wireless networks. It demonstrates the basic principles of different security algorithms, and sketches up the ways how the attacker tries to break them. Protecting the network against unauthorized access is a very significant part of the subject, but securing the network against dangerous activities of already authorized clients is very crucial too. This article also tries to discuss several methods and proposals for implementing a new model of monitoring the wireless networks. The aim of this monitoring is to allow system administrators to limit access to the network for users who are trying to break the security rules given by the network administrator. [PUBLICATION ABSTRACT] |
---|---|
Bibliography: | SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 ObjectType-Article-2 content type line 23 |
ISSN: | 1844-6035 2067-2128 |