A Visualization Tool for Wireless Network Attacks

被引:0
|
作者
Yuan, Xiaohong [1 ]
Archer, Ricky L. [1 ]
Xu, Jinsheng [1 ]
Yu, Huiming [1 ]
机构
[1] N Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC 27411 USA
关键词
wireless network attacks; visualization tools; information Security education; Evil Twin; Man in the Middle; ARP Cache Poisoning; ARP Request Replay;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for computer security professionals has caused the increase of information security curricula in the universities. Information security courses benefit from such educational resources as hands-on activities, laboratory experiments and concept visualization. This paper presents a visualization tool that demonstrates various attacks popular in wireless networks. This visualization tool is intended to be used in an undergraduate level computer security Course or a Computer network Course. The tool has been used and evaluated in two information Security related classes in the Fall 2007 semester and has demonstrated effectiveness in assisting student learning.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [1] A Visualization Tool for Analyzing the Design of Physical and Network Layers Parameters of a Wireless Network
    Araujo, Jasmine
    Rodrigues, Josiane
    Fraiha, Simone
    Gomes, Herminio
    Vijaykumar, Nandamudi Lankalapalli
    Cavalcante, Gervasio
    Frances, Carlos
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 3, 2013, 178 : 291 - +
  • [2] Jamming attacks in wireless network
    Sun, Y.-Q. (yq_sun@nudt.edu.cn), 1600, Chinese Academy of Sciences (23):
  • [3] Visualization of Complex Attacks and State of Attacked Network
    Yelizarov, Anatoly
    Gamayunov, Dennis
    6TH INTERNATIONAL WORKSHOP ON VISUALIZATION FOR CYBER SECURITY 2009, 2009, : 1 - 9
  • [4] Integrated Forensic Tool for Network Attacks
    Chen, Chia-Mei
    Lai, Gu-Hsin
    Tsai, Zheng-Xun
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 451 - 455
  • [5] Wireless Sensor Network Security Visualization
    Karapistoli, Eirini
    Economides, Anastasios A.
    IV INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS 2012 (ICUMT), 2012, : 850 - 856
  • [6] Survey of RTS/CTS attacks in Wireless network
    Sawwashere, Supriya S.
    Nimbhorkar, Sonali U.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 752 - 755
  • [7] A Novel Visualization Method for Detecting DDoS Network Attacks
    Zhang, Jiawan
    Yang, Guoqiang
    Lu, Liangfu
    Huang, MaoLin
    Che, Ming
    VISUAL INFORMATION COMMUNICATION, 2010, : 185 - +
  • [8] Simulation of Attacks for Security in Wireless Sensor Network
    Diaz, Alvaro
    Sanchez, Pablo
    SENSORS, 2016, 16 (11)
  • [9] Competence computation of attacks in wireless sensor network
    Singh, Neha
    Virmani, Deepali
    JOURNAL OF STATISTICS AND MANAGEMENT SYSTEMS, 2020, 23 (07) : 1227 - 1239
  • [10] Detailed Survey on Attacks in Wireless Sensor Network
    Dhakne, A. R.
    Chatur, P. N.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 319 - 331