Extending orchids for intrusion detection in 802.11 wireless networks

Author(s):  
Romdhane Ben Younes ◽  
Guy Tremblay ◽  
Guy Bégin
Author(s):  
Geoffrey Tyolaha ◽  
Moses Israel

In recent years, the number of mobile transactions has skyrocketed. Because mobile payments are made on the fly, many consumers prefer the method to the traditional local payment approach. The rise in mobile payments has inspired this study into the security of mobile networks in order to instill trust in those who may be involved in the transaction in some way. This report is a precursor to explain and compare some of the most popular wireless networks that enable mobile payments, from a security standpoint, this research presents, explains, and compares some of the most common wireless networks that enable mobile payments. Threat models in 3G with connections to GSM, WLAN, and 4G networks are classified into four categories: attacks on privacy, attacks on integrity, attacks on availability, and assaults on authentication. In addition, we offer classification countermeasures which are divided into three categories: cryptographic methods, human factors, and intrusion detection methods. One of the most important aspects we analyze is the security procedures that each network employs. Since the security of these networks is paramount, it gives hope to subscribers. In summary, the study aims to verify if mobile payments offer acceptable security to the average user.


Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 60486-60500 ◽  
Author(s):  
Jaime Zuniga-Mejia ◽  
Rafaela Villalpando-Hernandez ◽  
Cesar Vargas-Rosales ◽  
Andreas Spanias

2018 ◽  
Vol 5 (1) ◽  
pp. 92-107 ◽  
Author(s):  
Weijun Zhu ◽  
Miaolei Deng ◽  
Qinglei Zhou

Measurement ◽  
2017 ◽  
Vol 109 ◽  
pp. 79-87 ◽  
Author(s):  
Diego Santoro ◽  
Ginés Escudero-Andreu ◽  
Konstantinos G. Kyriakopoulos ◽  
Francisco J. Aparicio-Navarro ◽  
David J. Parish ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document