skip to main content
10.1145/1655925.1656002acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicisConference Proceedingsconference-collections
research-article

The study of the wireless network DoS attack

Authors Info & Claims
Published:24 November 2009Publication History

ABSTRACT

This study detail show that the routing path for the wireless network, and explain how to fast and efficient choosing the correct path. In addition, DoS attack has become the serious problem in the network security. Therefore, this study using the NS2 to simulate the DoS attacks. Finally we compare the variety of Queue for the tolerance of the attacks.

References

  1. Zhuang Xiao-yan, wireless network security solutions-802.1x implementations in the authenticator and improvement, National Taiwan University Institute of Information Engineering Master's thesisGoogle ScholarGoogle Scholar
  2. Ke Zhi Heng, Cheng Rongxiang, Kun Xie, Wen-Xiang Huang, computer network experiment - NS2 simulation tool to implement, learn Guan 2005Google ScholarGoogle Scholar
  3. Ke Zhi Heng, "NS2 manual http://140.116.72.80/~smallko/ns2/ns2.htm"Google ScholarGoogle Scholar
  4. Ma Shuzhen to network traffic data mining to assist in denial of service attack detection and defense research Department of Information Management Master's thesis, National Sun Yat-senGoogle ScholarGoogle Scholar
  5. Qi-lun, mobile networks under random routing attack defense mechanisms to resist, National Tsing Hua University Institute for Information Systems and Application Master's thesisGoogle ScholarGoogle Scholar
  6. Lo Chun-Lin, The study and simulation on VoIP Availability, Chinese Culture University, Digital Electrical Technology Institute Master's thesisGoogle ScholarGoogle Scholar

Index Terms

  1. The study of the wireless network DoS attack

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
      November 2009
      1479 pages
      ISBN:9781605587103
      DOI:10.1145/1655925

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Author Tags

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader