A Theoretical Framework For Mac

Posted on  by admin

Books.google.co.th - As software and computer hardware grows in complexity, networks have grown to match. The increasing scale, complexity, heterogeneity, and dynamism of communication networks, resources, and applications has made distributed computing systems brittle, unmanageable, and insecure.Internet and Distributed. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications.

. Part of the book series (AISC, volume 324) Abstract A major threat in wireless local area infrastructure network is denial-of-service (DoS) attacks. It makes the resources unavailable for its anticipated user which can be accomplished through spoofing legitimate client/AP’s medium access control (MAC) address.

Theoretical Framework For A Case Study

Framework

Less protection in MAC address led to get easy spoofing. Since the management frame is unencrypted, adversary sends the management frame to the victim using spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for DoS attack. Even though several preventing mechanisms are available, no one provides complete solution in preventing MAC layer DoS attack.

This paper proposes a theoretical framework of threshold value (ThreV) algorithm, which is based on setting up ThreV for the management frame, to effectively address this issue. Cite this paper as: Durairaj M., Persia A.

Theoretical Framework For Compassion Fatigue

(2015) Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network. In: Suresh L., Dash S., Panigrahi B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi.

First Online 02 November 2014. DOI. Publisher Name Springer, New Delhi. Print ISBN 978-81-322-2125-8.

Online ISBN 978-81-322-2126-5. eBook Packages.