[go: up one dir, main page]

Foust, 2002 - Google Patents

identifying and tracking unauthorized 802.11 cards and access points

Foust, 2002

View PDF
Document ID
2424772301918960165
Author
Foust R
Publication year
Publication venue
LOGIN: The Magazine of Usenix & Sage

External Links

Snippet

The object of this paper is simple: to determine whether an individual, using inexpensive off- the-shelf components and free software, could detect when an unauthorized 802.11 card or access point was powered up and began broadcasting within range of a local WLAN …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/391Modelling the propagation channel

Similar Documents

Publication Publication Date Title
EP1709824B1 (en) Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US8789191B2 (en) Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US7216365B2 (en) Automated sniffer apparatus and method for wireless local area network security
US7856656B1 (en) Method and system for detecting masquerading wireless devices in local area computer networks
US7856209B1 (en) Method and system for location estimation in wireless networks
US20060070113A1 (en) Method for wireless network security exposure visualization and scenario analysis
Li et al. Adversarial localization against wireless cameras
WO2006101617A2 (en) Method for wireless network security exposure visualization and scenario analysis
US7251457B1 (en) Wireless network perimeter security system using overlaying radio frequency signals
Foust identifying and tracking unauthorized 802.11 cards and access points
Mateti Hacking techniques in wireless networks
Dalrymple Comparison of zigbee replay attacks using a universal software radio peripheral and usb radio
Wilhelm et al. Air dominance in sensor networks: Guarding sensor motes using selective interference
Pedersen Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements
Pavithran et al. Long-Range Stealth Mode Wi-Fi Surveillance and Interception System
Thomas Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping
Vigo Jr Wireless Intrusion Detection Sytem
CN118748806A (en) A real-time network security detection system based on artificial intelligence
Aldasouqi et al. Determining an optimal number of access points using GPS data to secure a wireless network environment
Pandit A Study of Security Tools for Wireless Networks
Sun Improving Security in WLAN with the Use of Smart Antennas
Wells LITERATURE REVIEW: RF SIGNAL SOURCE MAPPING
CANSIAN et al. Wireless Lack of Security: A Case Study Surveying the Access Point Misconfiguration Problem at São Paulo City
Tao A novel intrusion detection system for detection of MAC address spoofing in wireless networks
Ali Location detection using WIFI