IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003.
DOI: 10.1109/smcsia.2003.1232404
|View full text |Cite
|
Sign up to set email alerts
|

Wireless security threat taxonomy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
1

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 82 publications
(44 citation statements)
references
References 2 publications
0
43
0
1
Order By: Relevance
“…Finally, the third piece of information the attacker can learn through traffic analysis is the type of protocol that is being used in the transmission, along with the size, type and number of packets being transmitted. For example, analysis of the three-way handshake information of TCP [17]. [16].…”
Section: A Confidentiality Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Finally, the third piece of information the attacker can learn through traffic analysis is the type of protocol that is being used in the transmission, along with the size, type and number of packets being transmitted. For example, analysis of the three-way handshake information of TCP [17]. [16].…”
Section: A Confidentiality Attacksmentioning
confidence: 99%
“…This attack occurs in real-time and the attacker uses the session for whatever purpose he/she wants and can maintain the session for an extended period of time [17].…”
Section: ) Session Hijacking: In Session Hijacking An Attacker Takementioning
confidence: 99%
See 1 more Smart Citation
“…To successfully execute session hijacking, the attacker must accomplish two tasks: He first needs to stop the target node from continuing the session and then disguise himself as one of the legal client nodes (Welch & Lathrop, 2003). The attacker can take the advantage of using Denial of Services (DoS) or a flood attack to achieve his first task for the session hijacking to temporarily interrupt the target's session connection; however, in order to masquerade himself as the target, he also needs to obtain the original secret key to maintain communication with the peer node.…”
Section: Session Hijackingmentioning
confidence: 99%
“…Malware can be used to launch attacks that vary from the less intrusive confidentiality or privacy attacks, such as traffic analysis and eavesdropping, to the more intrusive methods that either disrupt the nodes normal functions such as those in relaying data and establishing end-to-end routes (e.g., sinkhole attacks [1]), or even alter the network traffic and hence destroy the integrity of the information, such as unauthorized access and session hijacking attacks [2], [3]. Malware outbreaks like those of Slammer [4] and Code Red [5] worms in wired Internet have already inflicted expenses of billions of dollars in repair after the viruses rapidly infected thousands of hosts within few hours.…”
Section: Introduction A) Motivationmentioning
confidence: 99%