Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Robust Detection of Unauthorized Wireless Access Points

Unauthorized 802.11 wireless access points (APs), or rogue APs, such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secured. An attacker in the vicinity may easily get onto the internal network through a rogue AP, bypassing all perimeter security measures. Existing detection solutions do not work well for detecting r...

متن کامل

Unauthorized Version

A 'mole' at the Bristol Royal Infirmary tells me that at the last Hospital Committee Meeting it was explained to the assembled consultants that under the rules of the new Special Trust, when they have fulfilled the Provider contract for the number of patients to be seen in a particular week, they will not be allowed to see any more.

متن کامل

Trusted Detection of Unauthorized Filesystem Modifications to Combat Insider Tampering †

An insider-robust approach to file integrity verification is developed using interacting strata of mobile agents. Previous approaches relied upon monolithic architectures, or more recently, agent frameworks using a centralized control mechanism or common reporting repository. However, any such distinct tamperingpoint introduces vulnerabilities, especially from knowledgeable insiders capable of ...

متن کامل

Preventing Unauthorized Data Flows

Trojan Horse attacks can lead to unauthorized data flows and can cause either a confidentiality violation or an integrity violation. Existing solutions to address this problem employ analysis techniques that keep track of all subject accesses to objects, and hence can be expensive. In this paper we show that for an unauthorized flow to exist in an access control matrix, a flow of length one mus...

متن کامل

Legal Aspects of Unauthorized Bank Payments

 One of the complex matters in banking law is the problems and mistakes which occur in the process of bank payments. Mistake of banker or error in processing of information in bank networks may result in payment delay or paying money to the account of a person other than who was really intended. This article is about rules for allocation of losses between account holders implicated and t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Korean Institute of Communications and Information Sciences

سال: 2015

ISSN: 1226-4717

DOI: 10.7840/kics.2015.40.3.551