Mateti, 2005 - Google Patents
Hacking techniques in wireless networksMateti, 2005
View HTML- Document ID
- 15277513364552210857
- Author
- Mateti P
- Publication year
- Publication venue
- Handbook of information security
External Links
Snippet
Abstract This article describes IEEE 802.11-specific hacking techniques that attackers have used, and suggests various defensive measures. We describe sniffing, spoofing and probing in the context of wireless networks. We describe how SSIDs can be determined, how a …
- 238000000034 method 0 title abstract description 31
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8281392B2 (en) | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection | |
Potter et al. | 802.11 Security | |
US7577424B2 (en) | Systems and methods for wireless vulnerability analysis | |
Maxim et al. | Wireless security | |
Waliullah et al. | Wireless LAN security threats & vulnerabilities | |
CN114173324A (en) | System and method for multilink device privacy protection | |
Dai Zovi et al. | Attacking automatic wireless network selection | |
Mateti | Hacking techniques in wireless networks | |
Kılınçer et al. | Automated fake access point attack detection and prevention system with IoT devices | |
Kaplanis | Detection and prevention of man in the middle attacks in Wi-Fi technology | |
US8542581B2 (en) | System and method for exposing malicious clients in wireless access networks | |
Siles | Honeyspot: The wireless honeypot | |
Issac et al. | The art of war driving and security threats-a Malaysian case study | |
Mateti | Monthly Archives: July, 2009 | |
Salasabi et al. | A Practical Approach to Asses Fatal Attacks in Enterprise Network to Identify Effective Mitigation Techniques | |
Nakhila | Masquerading techniques in IEEE 802.11 wireless local area networks | |
Helleseth | Wi-Fi Security: How to Break and Exploit | |
Elhamahmy et al. | Preventing information leakage caused by war driving attacks in wi-fi networks | |
Rajib | Wireless LAN 802.11 security | |
Vilius et al. | A Critical Analysis of the Efficiencies of Emerging Wireless Security Standards Against Network Attacks | |
Farik et al. | Recurrent Security Gaps In 802.11 ac Routers | |
Sinha et al. | Wireless intrusion protection system using distributed collaborative intelligence | |
Gupta et al. | Wireless Hacking | |
Liang et al. | The practical risk assessment for enterprise Wireless Local Area Network | |
Gherghina et al. | Wireless LAN Security Issues (II)-Security Assurance |