Download PDFOpen PDF in browserConfronting and Intrusion Detection Techniques of Cyber-Attacks in Wired and Wireless Communication NetworksEasyChair Preprint 913310 pages•Date: October 26, 2022AbstractThis publication aims to study the attacks that telecommunications networks face every day. Thus, the tools that have been developed through new technologies are presented in detail in order to successfully deal with these attacks. Some of these tools are more effective and others less effective depending on the form of attack. As a conclusion is that very significant steps have been taken in confronting with attacks by intruders by introducing a new and wide field of study in the networks. Keyphrases: Cash Poisoning, MAC spoofing, Twin Attack
|