Foust, 2002 - Google Patents
identifying and tracking unauthorized 802.11 cards and access pointsFoust, 2002
View PDF- Document ID
- 2424772301918960165
- Author
- Foust R
- Publication year
- Publication venue
- LOGIN: The Magazine of Usenix & Sage
External Links
Snippet
The object of this paper is simple: to determine whether an individual, using inexpensive off- the-shelf components and free software, could detect when an unauthorized 802.11 card or access point was powered up and began broadcasting within range of a local WLAN …
- 230000000694 effects 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/06—Testing, supervising or monitoring using simulated traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
- H04B17/30—Monitoring; Testing of propagation channels
- H04B17/391—Modelling the propagation channel
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1709824B1 (en) | Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices | |
US8789191B2 (en) | Automated sniffer apparatus and method for monitoring computer systems for unauthorized access | |
US7216365B2 (en) | Automated sniffer apparatus and method for wireless local area network security | |
US7856656B1 (en) | Method and system for detecting masquerading wireless devices in local area computer networks | |
US7856209B1 (en) | Method and system for location estimation in wireless networks | |
US20060070113A1 (en) | Method for wireless network security exposure visualization and scenario analysis | |
Li et al. | Adversarial localization against wireless cameras | |
WO2006101617A2 (en) | Method for wireless network security exposure visualization and scenario analysis | |
US7251457B1 (en) | Wireless network perimeter security system using overlaying radio frequency signals | |
Foust | identifying and tracking unauthorized 802.11 cards and access points | |
Mateti | Hacking techniques in wireless networks | |
Dalrymple | Comparison of zigbee replay attacks using a universal software radio peripheral and usb radio | |
Wilhelm et al. | Air dominance in sensor networks: Guarding sensor motes using selective interference | |
Pedersen | Detecting Wireless Identity Spoofs in Urban Settings, Based on Received Signal Strength Measurements | |
Pavithran et al. | Long-Range Stealth Mode Wi-Fi Surveillance and Interception System | |
Thomas | Exploring the Efficiency of Software-Defined Radios in 3D Heat Mapping | |
Vigo Jr | Wireless Intrusion Detection Sytem | |
CN118748806A (en) | A real-time network security detection system based on artificial intelligence | |
Aldasouqi et al. | Determining an optimal number of access points using GPS data to secure a wireless network environment | |
Pandit | A Study of Security Tools for Wireless Networks | |
Sun | Improving Security in WLAN with the Use of Smart Antennas | |
Wells | LITERATURE REVIEW: RF SIGNAL SOURCE MAPPING | |
CANSIAN et al. | Wireless Lack of Security: A Case Study Surveying the Access Point Misconfiguration Problem at São Paulo City | |
Tao | A novel intrusion detection system for detection of MAC address spoofing in wireless networks | |
Ali | Location detection using WIFI |