Localization for Intrusion Detection in Wireless Local Area Networks
| dc.contributor.advisor | Dr Mihail Sichitiu, Committee Chair | en_US |
| dc.contributor.advisor | Dr Peng Ning, Committee Member | en_US |
| dc.contributor.advisor | Dr Wenye Wang, Committee Member | en_US |
| dc.contributor.author | Bhargava, Vishal | en_US |
| dc.date.accessioned | 2010-04-02T17:54:42Z | |
| dc.date.available | 2010-04-02T17:54:42Z | |
| dc.date.issued | 2004-11-19 | en_US |
| dc.degree.discipline | Computer Networking | en_US |
| dc.degree.level | thesis | en_US |
| dc.degree.name | MS | en_US |
| dc.description.abstract | On a wired network, authentication is implicitly provided by physical access; if a user is close enough to the network to plug in a cable, he must have gotten past the receptionist at the front door. While this is a weak definition of authentication, and one that is clearly inappropriate for high-security environments, it works reasonably well as long as the physical access control procedures are strong. Wireless Networks are attractive, in large part, because physical access is not required to use network resources. Therefore, a major component of maintaining network security is ensuring that stations attempting to associate with the network are allowed to do so. In this paper, we present a method to identify the location of wireless LAN users, and thus defend a "parking lot" attack. | en_US |
| dc.identifier.other | etd-10172003-081419 | en_US |
| dc.identifier.uri | http://www.lib.ncsu.edu/resolver/1840.16/323 | |
| dc.rights | I hereby certify that, if appropriate, I have obtained and attached hereto a written permission statement from the owner(s) of each third party copyrighted matter to be included in my thesis, dissertation, or project report, allowing distribution as specified below. I certify that the version I submitted is the same as that approved by my advisory committee. I hereby grant to NC State University or its agents the non-exclusive license to archive and make accessible, under the conditions specified below, my thesis, dissertation, or project report in whole or in part in all forms of media, now or hereafter known. I retain all other ownership rights to the copyright of the thesis, dissertation or project report. I also retain the right to use in future works (such as articles or books) all or part of this thesis, dissertation, or project report. | en_US |
| dc.subject | 802.11b | en_US |
| dc.subject | RSSI | en_US |
| dc.subject | active attacker | en_US |
| dc.subject | parking lot attack | en_US |
| dc.subject | Security | en_US |
| dc.subject | Localization | en_US |
| dc.subject | Wireless LAN | en_US |
| dc.title | Localization for Intrusion Detection in Wireless Local Area Networks | en_US |
Files
Original bundle
1 - 1 of 1
