Intrusion Detection Approach & Tools

Provided by: IJESIT
Topic: Security
Format: PDF
Wireless networks have become important technology in the last few years due to the rapid growth in wireless devices. Communication in wireless network takes place over an open medium that is accessible to all users. Wireless medium is available to both legitimate network users and malicious users. Because of the nature of open medium they are more prone to attack. Because of this, the conventional theories or ways of guarding the network with firewall and encryption is no longer enough and efficient.

Find By Topic