{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:05:15Z","timestamp":1772643915923,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,15]],"date-time":"2021-12-15T00:00:00Z","timestamp":1639526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,15]]},"DOI":"10.1145\/3508072.3508186","type":"proceedings-article","created":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T17:01:56Z","timestamp":1649869316000},"page":"555-561","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Investigation of Attacks and Methods of Protection of Wireless Networks During Authorization Using the IEEE 802.1x Protocol"],"prefix":"10.1145","author":[{"given":"Maxim","family":"Kovtsur","sequence":"first","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Andrey","family":"Minyaev","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Dmitrii","family":"Khramtsov","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]},{"given":"Georgii","family":"Abramenko","sequence":"additional","affiliation":[{"name":"The Bonch-Bruevich Saint Petersburg State University of Telecommunications, Russia"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Distributed edge computing to assist ultra-low-latency VANET applications. Future Internet, 11(6)","author":"Vladyko A.","year":"2019","unstructured":"A. Vladyko , A. Khakimov , A. Muthanna , A. A. Ateya , and A. Koucheryavy , ( 2019 ). Distributed edge computing to assist ultra-low-latency VANET applications. Future Internet, 11(6) . A. Vladyko, A. Khakimov, A. Muthanna, A. A. Ateya, and A. Koucheryavy, (2019). Distributed edge computing to assist ultra-low-latency VANET applications. Future Internet, 11(6)."},{"key":"e_1_3_2_2_2_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).","first-page":"205","volume-title":"Dynamic data packaging protocol for real-time medical applications of nanonetworks","author":"Pirmagomedov R.","year":"2017","unstructured":"R. Pirmagomedov , M. Blinnikov , R. Glushakov , A. Muthanna , R. Kirichek , and A. Koucheryavy , ( 2017 ). Dynamic data packaging protocol for real-time medical applications of nanonetworks . In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10531 LNCS , pp. 196\u2013 205 . R. Pirmagomedov, M. Blinnikov, R. Glushakov, A. Muthanna, R. Kirichek, and A. Koucheryavy, (2017). Dynamic data packaging protocol for real-time medical applications of nanonetworks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10531 LNCS, pp. 196\u2013205."},{"key":"e_1_3_2_2_3_1","unstructured":"Cisco predicts an increase in data transfer speed the number of Internet users and the number of devices connected to the network in Russia. [Electronic resource] URL: https:\/\/www.cisco.com\/c\/ru_ru\/about\/press\/press-releases\/2020\/04-14.html.  Cisco predicts an increase in data transfer speed the number of Internet users and the number of devices connected to the network in Russia. [Electronic resource] URL: https:\/\/www.cisco.com\/c\/ru_ru\/about\/press\/press-releases\/2020\/04-14.html."},{"key":"e_1_3_2_2_4_1","first-page":"113","volume-title":"Detection of wireless fake access points \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","author":"Lovinger N.","year":"2020","unstructured":"N. Lovinger , T. Gerlich , Z. Martinasek and L. Malina , Detection of wireless fake access points \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) , 2020 , pp. 113 - 118 . N. Lovinger, T. Gerlich, Z. Martinasek and L. Malina, Detection of wireless fake access points \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, pp. 113-118."},{"key":"e_1_3_2_2_5_1","unstructured":"Reports on DDoS attacks. DDoS attacks in the third quarter of 2020 [Electronic resource] URL: https:\/\/securelist.com\/ddos-attacks-in-q3-2020\/99091.  Reports on DDoS attacks. DDoS attacks in the third quarter of 2020 [Electronic resource] URL: https:\/\/securelist.com\/ddos-attacks-in-q3-2020\/99091."},{"key":"e_1_3_2_2_6_1","volume-title":"Investigation of authentication failure and arp injection attacks and methods of their detection in IEEE 802.11 family networks \/\/ Information technologies and telecommunications","author":"Kovtsur M. M.","year":"2021","unstructured":"M. M. Kovtsur , A. Yu. Kistruga , G. E. Voroshnin , A. E. Fedorova . Investigation of authentication failure and arp injection attacks and methods of their detection in IEEE 802.11 family networks \/\/ Information technologies and telecommunications . 2021 . Vol. 9 . No. 1. pp. 87-98. M. M. Kovtsur, A. Yu. Kistruga, G. E. Voroshnin, A. E. Fedorova. Investigation of authentication failure and arp injection attacks and methods of their detection in IEEE 802.11 family networks \/\/ Information technologies and telecommunications. 2021. Vol. 9. No. 1. pp. 87-98."},{"key":"e_1_3_2_2_7_1","first-page":"113","volume-title":"Detection of wireless fake access points \/\/\u00a02020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","author":"Lovinger N.","year":"2020","unstructured":"N. Lovinger , T. Gerlich , Z. Martinasek and L. Malina . Detection of wireless fake access points \/\/\u00a02020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) , 2020 , pp. 113 - 118 . N. Lovinger, T. Gerlich, Z. Martinasek and L. Malina. Detection of wireless fake access points \/\/\u00a02020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020, pp. 113-118."},{"key":"e_1_3_2_2_8_1","first-page":"8","author":"Tushir B.","year":"2021","unstructured":"B. Tushir , Y. Dalal , B. Dezfouli and Y. Liu . A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices in\u00a0IEEE Internet of Things Journal , 15 April , 2021 , vol. 8 , no. 8, pp. 6282-6292. B. Tushir, Y. Dalal, B. Dezfouli and Y. Liu. A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices in\u00a0IEEE Internet of Things Journal, 15 April, 2021, vol. 8, no. 8, pp. 6282-6292.","journal-title":"A Quantitative Study of DDoS and E-DDoS Attacks on WiFi Smart Home Devices in\u00a0IEEE Internet of Things Journal"},{"key":"e_1_3_2_2_9_1","unstructured":"J. Henry R. Barton D. Hucaby \/ CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide. Cisco Press \u2013 2020. P. 576.  J. Henry R. Barton D. Hucaby \/ CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Official Cert Guide. Cisco Press \u2013 2020. P. 576."},{"key":"e_1_3_2_2_10_1","first-page":"389","volume-title":"ISDMCI 2019: Lecture Notes in Computational Intelligence and Decision Making","author":"Chyrun Lyubomyr","unstructured":"Lyubomyr Chyrun , Liliya Chyrun , Yaroslav Kis , Lev Rybak , Information System for Connection to the Access Point with Encryption WPA2 Enterprise \/\/ International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence \u201d, ISDMCI 2019: Lecture Notes in Computational Intelligence and Decision Making pp 389 - 404 . Lyubomyr Chyrun, Liliya Chyrun, Yaroslav Kis, Lev Rybak, Information System for Connection to the Access Point with Encryption WPA2 Enterprise \/\/ International Scientific Conference \u201cIntellectual Systems of Decision Making and Problem of Computational Intelligence\u201d, ISDMCI 2019: Lecture Notes in Computational Intelligence and Decision Making pp 389-404."},{"key":"e_1_3_2_2_11_1","first-page":"164","volume-title":"A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP \/\/ 2008 International Conference on Information Science and Security (ICISS","author":"Hwang H.","year":"2008","unstructured":"H. Hwang , G. Jung , K. Sohn and S. Park , A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP \/\/ 2008 International Conference on Information Science and Security (ICISS 2008 ), 2008, pp. 164 - 170 . H. Hwang, G. Jung, K. Sohn and S. Park, A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP \/\/ 2008 International Conference on Information Science and Security (ICISS 2008), 2008, pp. 164-170."},{"key":"e_1_3_2_2_12_1","first-page":"291","volume-title":"The Method and Methodology of efficiency assessment of protection system of distributed information systems \/ Institute of Electrical and Electronics Engineers \u2013","author":"Minyaev A.","year":"2020","unstructured":"A. Minyaev , A. Krasov , D. Saharov . The Method and Methodology of efficiency assessment of protection system of distributed information systems \/ Institute of Electrical and Electronics Engineers \u2013 2020 , pp. 291 - 295 . A. Minyaev, A. Krasov, D. Saharov. The Method and Methodology of efficiency assessment of protection system of distributed information systems \/ Institute of Electrical and Electronics Engineers \u2013 2020, pp. 291-295."},{"key":"e_1_3_2_2_13_1","first-page":"296","volume-title":"Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","author":"Vikulov A.","year":"2020","unstructured":"A. Vikulov , A. Paramonov . Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) , 2020 . pp. 296 - 300 . A. Vikulov, A. Paramonov. Practical retrospective of 5-year evolution of the IEEE 802.11 client device capabilities \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020. pp. 296-300."},{"issue":"11","key":"e_1_3_2_2_14_1","volume":"802","author":"Pokorny J.","unstructured":"J. Pokorny , R. Fujdiak , M. Kovanda , M. Strajt , J. Hosek. Traffic Analysis of IEEE 802 . 11 on Physical Layer by using Software Defined Radio \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020. pp. 78-81. J. Pokorny, R. Fujdiak, M. Kovanda, M. Strajt, J. Hosek. Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio \/\/ 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2020. pp. 78-81.","journal-title":"J. Hosek. Traffic Analysis of IEEE"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1386-3"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00022"},{"key":"e_1_3_2_2_17_1","first-page":"1","volume-title":"2018 International Joint Conference on Neural Networks (IJCNN)","author":"Vilela D. W.","unstructured":"D. W. Vilela , A. D. P. Lotufo , and C. R. Santos , (2018, July). Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11 w data base . In 2018 International Joint Conference on Neural Networks (IJCNN) , pp. 1 - 7 . D. W. Vilela, A. D. P. Lotufo, and C. R. Santos, (2018, July). Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11 w data base. In 2018 International Joint Conference on Neural Networks (IJCNN), pp. 1-7."},{"key":"e_1_3_2_2_18_1","first-page":"147","volume-title":"Networks and Applications","author":"Zhang Yujia","year":"2010","unstructured":"Yujia Zhang , Guanlin Chen , Wenyong Weng and Zebing Wang , An overview of wireless intrusion prevention systems \/\/ 2010 Second International Conference on Communication Systems , Networks and Applications , 2010 , pp. 147 - 150 . Yujia Zhang, Guanlin Chen, Wenyong Weng and Zebing Wang, An overview of wireless intrusion prevention systems \/\/ 2010 Second International Conference on Communication Systems, Networks and Applications, 2010, pp. 147-150."}],"event":{"name":"ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems","location":"Dubai United Arab Emirates","acronym":"ICFNDS 2021"},"container-title":["The 5th International Conference on Future Networks &amp; Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508186","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508072.3508186","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:30Z","timestamp":1750191150000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508072.3508186"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,15]]},"references-count":18,"alternative-id":["10.1145\/3508072.3508186","10.1145\/3508072"],"URL":"https:\/\/doi.org\/10.1145\/3508072.3508186","relation":{},"subject":[],"published":{"date-parts":[[2021,12,15]]},"assertion":[{"value":"2022-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}