CheckShake: Passively detecting anomaly in Wi-Fi security handshake using gradient boosting based ensemble learning

A Agrawal, U Chatterjee… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, a number of attacks have been demonstrated (like key reinstallation attack, called
KRACK) on WPA2 protocol suite in Wi-Fi WLAN, for which a patching is often challenging. In …

A Client-Side Evil-Twin Attack Detection System with Threshold Considering Traffic Load

T Ueda, A Saif, S Miyata, M Nakahara… - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
In recent years, public wireless LANs have been increasingly installed in public places. On
the other hand, free Wi-Fi has various security issues. One of these problems is the evil-twin …

[PDF][PDF] NETWORK SECURITY USING FOG COMPUTING IS A DECENTRALIZED NETWORK COMPUTING

VS Kumar, PE Elango - ijctjournal.org
Fog computing is a gifted computing paradigm that spreads cloud computing to the
advantage of networks. Fog computing is considered as an extension of cloud computing to …