• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

802.11 denial-of-service attacks: Real vulnerabilities and practical solutions (2003)

Cached

  • Download as a PDF

Download Links

  • [www.cs.washington.edu]
  • [www.cs.ucsd.edu]
  • [www.cs.ucsd.edu]
  • [sysnet.ucsd.edu]
  • [ramp.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www-cse.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [www.cs.ucsb.edu]
  • [cs.ucsb.edu]
  • [www.cse.sc.edu]
  • [users.csc.calpoly.edu]
  • [www.sysnet.ucsd.edu]
  • [cseweb.ucsd.edu]
  • [sharif.edu]
  • [www.cs.ucsb.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by John Bellardo , Stefan Savage
Venue:in Proceedings of the USENIX Security Symposium, Washington D.C
Citations:258 - 2 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Bellardo03802.11denial-of-service,
    author = {John Bellardo and Stefan Savage},
    title = {802.11 denial-of-service attacks: Real vulnerabilities and practical solutions},
    booktitle = {in Proceedings of the USENIX Security Symposium, Washington D.C},
    year = {2003}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

The convenience of 802.11-based wireless access networks has led to widespread deployment in the consumer, industrial and military sectors. However, this use is predicated on an implicit assumption of confidentiality and availability. While the security flaws in 802.11’s basic confidentially mechanisms have been widely publicized, the threats to network availability are far less widely appreciated. In fact, it has been suggested that 802.11 is highly susceptible to malicious denial-of-service (DoS) attacks targeting its management and media access protocols. This paper provides an experimental analysis of such 802.11-specific attacks – their practicality, their efficacy and potential low-overhead implementation changes to mitigate the underlying vulnerabilities. 1

Keyphrases

practical solution    real vulnerability    denial-of-service attack    underlying vulnerability    11-specific attack    network availability    implicit assumption    widespread deployment    security flaw    potential low-overhead implementation change    11-based wireless access network    medium access protocol    malicious denial-of-service    experimental analysis    military sector   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University