Designing a Secure Network Interface By Thwarting Mac Spoofing Attacks.
Debi Prasad MishraPrajnya Priyadarsini SatapathyBiswajit MishraPublished in: ICTCS (2016)
Keyphrases
- traffic analysis
- security measures
- ddos attacks
- security threats
- network structure
- computer networks
- security mechanisms
- security protocols
- network anomaly detection
- network attacks
- countermeasures
- key management
- cryptographic protocols
- authentication protocol
- stream cipher
- cyber attacks
- application level
- user interface
- interface design
- network traffic
- sensor networks