Security and privacy in an IT context a low-cost WIDS employed against MITM attacks (concept)

被引:0
|
作者
Poljak, N. [1 ]
Sevo, M. [1 ]
Livaja, I. [1 ]
机构
[1] Veleuciliste Sibeniku Odjel Menadzmenta, Trg Andrije Hebranga 11, Shibenik 22000, Hrvatska, Croatia
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Contemporary rates of WiFi (802.11) adoption have turned the technology into an oft underestimated source of potential security breaches. Even though the lay user base typically feels protected by employing basic encryption (first WEP, then WPA and currently WPA2), the truth is that it is trivially easy to perform a multitude of attacks on typical home and small business setups. This paper will cover the danger of a MITM') attack as well as fairly straightforward steps one might take to prevent such intrusions by implementing a basic WIDS2 setup with off-the-shelf hardware and open source software.
引用
收藏
页码:1614 / 1617
页数:4
相关论文
共 50 条
  • [21] FPSelect: Low-Cost Browser Fingerprints for Mitigating Dictionary Attacks against Web Authentication Mechanisms
    Andriamilanto, Nampoina
    Allard, Tristan
    Le Guelvouit, Gaetan
    36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 627 - 642
  • [22] Low-Cost Microwave Security Camera System
    Darwish, Ahmed N.
    Zakaria, Amer
    Qaddoumi, Nasser
    Albasha, Lutfi
    2016 16TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS), 2016,
  • [23] Design of a Security Protocol for Low-cost RFID
    Xu, Yuanzhong
    He, Zhangqing
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [24] Low-cost security aware HLS methodology
    Sengupta, Anirban
    Bhadauria, Saumya
    Mohanty, Saraju P.
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (02): : 68 - 79
  • [25] LOW-COST HIGH-TECHNOLOGY JEOPARDIZES PRIVACY
    SHANDLE, J
    ELECTRONICS-US, 1992, 65 (17): : 12 - 12
  • [26] Low-cost Implementations of NTRU for pervasive security
    Atici, Ali Can
    Batina, Lejla
    Fan, Junfeng
    Verbauwhede, Ingrid
    Yalcin, S. Berna Oers
    2008 INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2008, : 79 - +
  • [27] A low-cost network controller for security systems
    Bykovyy, P.
    Maykiv, I.
    Turchenko, I.
    Kochan, O.
    Yatskiv, V.
    Markowsky, G.
    2005 IEEE INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2005, : 388 - 391
  • [28] Low-cost measurement concept for Ethernet traffic
    Wajda, K
    Zaraska, K
    PROCEEDINGS ELMAR-2004: 46TH INTERNATIONAL SYMPOSIUM ELECTRONICS IN MARINE, 2004, : 424 - 429
  • [29] LOW-COST TELEOPERATORS - A NEW INDUSTRIAL CONCEPT
    JOHNSEN, EG
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1970, 13 (02): : 852 - &
  • [30] TEC-Tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks
    Elbaz, Reouven
    Champagne, David
    Lee, Ruby B.
    Torres, Lionel
    Sassatelli, Gilles
    Guillemin, Pierre
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2007, PROCEEDINGS, 2007, 4727 : 289 - +