Jump to content
Nytro

Denial of Service Attacks in Wireless Networks

Recommended Posts

Posted

Denial of Service Attacks in WirelessNetworks

BUSINESS NEED FOR SECURITY

Denial of Service Attacks in WirelessNetworks

ByMallikarjun Hangargi

Graduate StudentMaster of Science in Information Assurance

Northeastern University

Table of Contents
I. Introduction……………………………………………………………………………………………………………………1
II. Jamming (intentional interference) & unintentional interference at the Physical layer….2
III. Intentional DoS at the Media Access Control (MAC) layer like Masquerading attacks and
Resource exhaustion attack……………………………………………………………………………………………7
A. Lack of management and control frame protection………………………………………………....7
i. Resource Exhaustion attack………………………………………………………………………………….8
ii. De-authentication Flooding attack……………………………………………………………………..10
iii. Disassociation Flooding attack……………………………………………………………………………12
IV. Conclusion……………………………………………………………………………………………………………………14
V. Reference…………………………………………………………………………………………………………………….15

Download: http://packetstorm.foofus.com/papers/wireless/DoS_attacks_in_wireless_networks.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...