HOME JOURNALS CONTACT

Information Technology Journal

Year: 2008 | Volume: 7 | Issue: 5 | Page No.: 814-819
DOI: 10.3923/itj.2008.814.819
Distributed IDS in Case of Continuous Attack and Performance Analysis of Access Points
A.K. Kakakhel and N. Anjum

Abstract: The shared nature of wireless network and design of MAC protocol allowed multiple networks to share the same space and radio channel. Intruders could easily inject limitless traffic into the radio network without being attached to wireless access point and could easily lessen the performance level of WLAN as well as access point. We presented a very simple methodology to produce the continuous attack (continuous injection of arbitrary packets into access point) by using Solar winds tool, WAN Killer and monitor the performance of access point using other solar winds tool Network performance monitor. We have taken into consideration different parameters to perform analysis of performance of access point during continuous attack, but the key parameters were average response time and packet lose ratio. Based on this analysis, we proposed some security enhancement features for access point so that the performance level of access point during continuous attack could be raised.

Fulltext PDF Fulltext HTML

How to cite this article
A.K. Kakakhel and N. Anjum, 2008. Distributed IDS in Case of Continuous Attack and Performance Analysis of Access Points. Information Technology Journal, 7: 814-819.

Related Articles:
© Science Alert. All Rights Reserved