2013 IEEE International Conference on Communications Workshops (ICC) 2013
DOI: 10.1109/iccw.2013.6649386
|View full text |Cite
|
Sign up to set email alerts
|

Using multiscale traffic analysis to detect WPS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…However, their detection algorithm is based on a few mathematical assumptions. This self-defined attack rules is something bazaar for home users' mitigation action as according to [2] that more complex configurations for common Internet users causing them to deactivate wireless security in order to avoid sophisticated setups. In this study we adapt their data packet capture module and data packet analysis module.…”
Section: Related Studiesmentioning
confidence: 99%
See 3 more Smart Citations
“…However, their detection algorithm is based on a few mathematical assumptions. This self-defined attack rules is something bazaar for home users' mitigation action as according to [2] that more complex configurations for common Internet users causing them to deactivate wireless security in order to avoid sophisticated setups. In this study we adapt their data packet capture module and data packet analysis module.…”
Section: Related Studiesmentioning
confidence: 99%
“…In [2] discussedReaver software that allows brute force activities and later outlines detection activity to capture, decode and analyze all wireless frames with regards to this attack. However those proposed countermeasures should be adopted by vendors to prevent brute force attacks and this is something beyond end users action domain.…”
Section: Related Studiesmentioning
confidence: 99%
See 2 more Smart Citations