Digital Library
Close Browse articles from a journal
 
<< previous    next >>
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
           All articles of the corresponding issues
                                       Details for article 18 of 34 found articles
 
 
  Distributed IDS in Case of Continuous Attack and Performance Analysis of Access Points
 
 
Title: Distributed IDS in Case of Continuous Attack and Performance Analysis of Access Points
Author: A.K. Kakakhel
N. Anjum
Appeared in: Information technology journal
Paging: Volume 7 (2008) nr. 5 pages 814-819
Year: 2008
Contents: The shared nature of wireless network and design of MAC protocol allowed multiple networks to share the same space and radio channel. Intruders could easily inject limitless traffic into the radio network without being attached to wireless access point and could easily lessen the performance level of WLAN as well as access point. We presented a very simple methodology to produce the continuous attack (continuous injection of arbitrary packets into access point) by using Solar winds tool, WAN Killer and monitor the performance of access point using other solar winds tool Network performance monitor. We have taken into consideration different parameters to perform analysis of performance of access point during continuous attack, but the key parameters were average response time and packet lose ratio. Based on this analysis, we proposed some security enhancement features for access point so that the performance level of access point during continuous attack could be raised.
Publisher: Asian Network for Scientific Information, Pakistan (provided by DOAJ)
Source file: Elektronische Wetenschappelijke Tijdschriften
 
 

                             Details for article 18 of 34 found articles
 
<< previous    next >>
 
 Koninklijke Bibliotheek - National Library of the Netherlands