Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak
{"title":"A concept of behavioral reputation system in wireless networks","authors":"Matej Kacic, P. Hanáček, Martin Henzl, I. Homoliak","doi":"10.1109/CCST.2013.6922057","DOIUrl":null,"url":null,"abstract":"Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic, which may become a potential intrusion. Each client in wireless network is vulnerable to a variety of threats and attacks. Many attacks, especially in corporate networks, are realized from internal environment. Identity theft is another serious problem of wireless networks. We present a concept of reputation system based on user behavior. Our goal is to precisely identify every entity in wireless network, and then determine malicious behavior of these entities.","PeriodicalId":243791,"journal":{"name":"2013 47th International Carnahan Conference on Security Technology (ICCST)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 47th International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2013.6922057","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic, which may become a potential intrusion. Each client in wireless network is vulnerable to a variety of threats and attacks. Many attacks, especially in corporate networks, are realized from internal environment. Identity theft is another serious problem of wireless networks. We present a concept of reputation system based on user behavior. Our goal is to precisely identify every entity in wireless network, and then determine malicious behavior of these entities.