Open AccessJournal Article
Wireless networks: developments, threats and countermeasures
Reads0
Chats0
TLDR
The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.Abstract:
This paper discusses current threats in wireless networks and some academia research reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man In the Middle Attack (MITM), Rogue Access Points (RAP), Denial Of Services (DoS) and social engineering attacks. Some current developments of wireless communication technology such as short range communication, cloud computing, bring your own device policy (BYOD), devices tethering and convergences of WiFi and cellular network technology are also presented. Some practical suggestion and advanced countermeasures are also reviewed in this paper. The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.read more
Citations
More filters
Book ChapterDOI
Automated WPA2 Cracking Using Improved Dictionary and WPS Pin Attack
TL;DR: In this article, an automated system is proposed to crack the WPA2 passphrase much efficiently, and two different schemes are introduced which can improve the dictionary attack and overcome the existing issues.
Proceedings ArticleDOI
An Overview of Protocols-Based Security Threats and Countermeasures in WLAN
Nitish Ojha,Elyas Baray +1 more
TL;DR: In this paper , the authors reviewed many researchers' techniques and works on the WLAN security topic, there are shared threats to WLAN and the ways of taking precautions against those threats as countermeasures and for which the tables are used.
Journal ArticleDOI
A Study of Distinctive tools to hack wireless network
TL;DR: The tools implied to hack a wireless network and the weakness of WEP key in the wireless network due to which these are hacked are discussed.
Proceedings ArticleDOI
Physical Dangers in the Cyber Security and Precautions to be Taken
TL;DR: The main hardware tools used by the cyber attackers to exploit the systems, analyzed deeply, the hardware specifications of these tools, the targeted systems and the types of the attacks are investigated.
Journal Article
An in-memory approach to sentiment analysis based on sap hana
TL;DR: This paper describes and evaluates a lexicon-based SA solution, implemented as a prototype using SAP HANA, and results are made available on a user interface created using SAP's current interface technology, SAPUI5.
References
More filters
Proceedings ArticleDOI
Practical attacks against WEP and WPA
Erik Tews,Martin Beck +1 more
TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs: improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key, and dictionary attack when a weak pre-shared key is used.
Proceedings ArticleDOI
Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
Yimin Song,Chao Yang,Guofei Gu +2 more
TL;DR: This work proposes a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects and can identify evil twins with a very high detection rate while keeping a very low false positive rate.
Proceedings ArticleDOI
Cloud computing and security challenges
TL;DR: Cloud Computing services including data storage service, cloud computing operating system and software as a service will be introduced, Cloud Computing security challenges will be discussed and Cisco Secure Cloud Data Center Framework will be presented.
Journal ArticleDOI
Selective jamming/dropping insider attacks in wireless mesh networks
Loukas Lazos,Marwan Krunz +1 more
TL;DR: Various forms of sophisticated attacks launched from adversaries with internal access to the WMN are described and possible detection and mitigation mechanisms are identified.
Proceedings ArticleDOI
A Novel Approach for Rogue Access Point Detection on the Client-Side
TL;DR: This method compares the gateways and the routes that a packet travels to determine whether an access point is legitimate or not and can easily detect Man-In-The-Middle and evil twin attack without any assistance from the WLAN operator.
Related Papers (5)
A new virtualization-based security architecture in a cloud computing environment
Lena AlMutair,Soha S. Zaghloul +1 more