Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs.
Jerzy KonorskiSzymon SzottPublished in: IEEE Commun. Lett. (2017)
Keyphrases
- denial of service attacks
- worm detection
- countermeasures
- security threats
- dos attacks
- malicious attacks
- ddos attacks
- real time traffic
- cyber attacks
- insider attacks
- traffic analysis
- wireless networks
- wireless local area networks
- intrusion detection system
- intrusion detection
- insider threat
- security breaches
- security vulnerabilities
- network traffic
- security issues
- attack scenarios
- medium access control
- security risks
- computer security
- network security
- information security
- stepping stones
- data corruption
- normal traffic
- security measures
- traffic flow
- quality of service
- traffic congestion
- traffic information
- security policies
- atm networks
- buffer overflow
- energy consumption
- malicious traffic
- anomaly detection