search query: @instructor Hall, Michael / total: 17
reference: 5 / 17
« previous | next »
Author:Jin, Jing
Title:Investigation of Denial of Service (DoS) attack in Wireless LAN
Langattomissa lähiverkoissa tapahtuvien palvelunestohyökkäyksten tutkiminen
Publication type:Master's thesis
Publication year:2004
Pages:80      Language:   eng
Department/School:Sähkö- ja tietoliikennetekniikan osasto
Main subject:Tietoliikennetekniikka   (S-72)
Supervisor:Häggman, Sven-Gustav
Instructor:Hall, Michael
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark TKK  3053   | Archive
Keywords:(Distributed) Denial of Service
Intrusion Detection Systems
IEEE 802.11
HIPERLAN
WPA
802.1X
DoS attack
authentication
VPN
Abstract (eng): Denial of service (DoS) and distributed denial of service (DDoS) attacks are considered to be one of the most severe threat problems in wireless network security.
The Master's thesis describes some recent research on DoS attacks in wireless LAN, presents literature research covering different types of DoS in corresponding OSI layers in Wireless Local Area Network (Wireless LAN) IEEE 802.11 standards architecture and security mechanisms, and ETSI HIPERLAN architectures.
Additionally, the thesis reviews Local Area Network (LAN) security, considering both network operational security and network data security.
Furthermore, some defence methods, such as authentication and access control, 802.1X and EAPOL, and VPN against DoS attacks are introduced.
Moreover, different kinds of (distributed) DoS attacking tools, such as Trinoo, TFN, and Stacheldraht are introduced in a later chapter.
The Chinese new WLAN standard, WLAN Authentication and Privacy Infrastructure (WAPI) is also discussed briefly.

A new kind of DoS attack against IEEE 802.11 DSSS based WLANs is discussed.
The defence strategies and currently used defending tools against DoS attacks in WLANs are discussed.
It has been suggested that 802.11 networks are highly susceptible to malicious DoS attacks targeting their management and media access protocols.
The thesis provides an analysis of such 802.11-specific attacks.

The results show that there is no comprehensive solution against DoS attacks in WLAN currently.
To combat DoS attacks, the best way is not to make changes to the protocols, but to take external countermeasures, such as tracing the attacks, enforcing related law and enterprise usage policy systems.
Finally, in WLAN, the migration to the 5GHz range is both practical and market-rewarding.
ED:2005-09-02
INSSI record number: 29099
+ add basket
« previous | next »
INSSI