{"title":"Active Protection in Wireless Networking","authors":"Ming Lei, Yang Xiao, Susan V. Vrbsky","doi":"10.1109/MSN.2008.33","DOIUrl":null,"url":null,"abstract":"Adversaries can easily launch an attack, by taking advantage of the free wireless networking available to the public at many conferences, airports or cafes. Meanwhile in these environments, it is very difficult to identify the adversaries. In this paper, we present a scheme that is designed to defend against potential attacks at a very early stage, in order to minimize the damage to the victims and the entire network. Instead of taking actions only after the attacks arrive at the host, our scheme makes the access point the one who monitors, identifies and prevents potential attacks. In this active protection way, the system can respond more quickly and can also prevent much of the malicious network traffic.","PeriodicalId":135604,"journal":{"name":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2008-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 The 4th International Conference on Mobile Ad-hoc and Sensor Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MSN.2008.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Adversaries can easily launch an attack, by taking advantage of the free wireless networking available to the public at many conferences, airports or cafes. Meanwhile in these environments, it is very difficult to identify the adversaries. In this paper, we present a scheme that is designed to defend against potential attacks at a very early stage, in order to minimize the damage to the victims and the entire network. Instead of taking actions only after the attacks arrive at the host, our scheme makes the access point the one who monitors, identifies and prevents potential attacks. In this active protection way, the system can respond more quickly and can also prevent much of the malicious network traffic.