A Visualization Tool for Wireless Network Attacks

被引:0
|
作者
Yuan, Xiaohong [1 ]
Archer, Ricky L. [1 ]
Xu, Jinsheng [1 ]
Yu, Huiming [1 ]
机构
[1] N Carolina Agr & Tech State Univ, Dept Comp Sci, Greensboro, NC 27411 USA
关键词
wireless network attacks; visualization tools; information Security education; Evil Twin; Man in the Middle; ARP Cache Poisoning; ARP Request Replay;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The demand for computer security professionals has caused the increase of information security curricula in the universities. Information security courses benefit from such educational resources as hands-on activities, laboratory experiments and concept visualization. This paper presents a visualization tool that demonstrates various attacks popular in wireless networks. This visualization tool is intended to be used in an undergraduate level computer security Course or a Computer network Course. The tool has been used and evaluated in two information Security related classes in the Fall 2007 semester and has demonstrated effectiveness in assisting student learning.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [41] Optimal False Data Injection Attacks in a Wireless Sensor Network
    Zhang, Ze-Yu
    Geng, Hao-Bo
    Li, Dong-Can
    Liu, Li-Li
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 5460 - 5465
  • [42] Hive Panel Explorer: an interactive network visualization tool
    Perez, Sarah E., I
    Hahn, Aria S.
    Krzywinski, Martin
    Hallam, Steven J.
    BIOINFORMATICS, 2021, 37 (03) : 436 - 437
  • [43] Novel visualization tool for heat exchanger network retrofit
    Univ of Edinburgh, Edinburgh, United Kingdom
    Ind Eng Chem Res, 12 (4507-4522):
  • [44] Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
    Shaukat, Haafizah Rameeza
    Hashim, Fazirulhisyam
    Sali, Aduwati
    Rasid, M. Fadlee Abdul
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [45] Effects of Selective Forwarding Attacks on Wireless Sensor Network Efficiency
    Sert, Seyyit Alper
    Yazici, Adnan
    Cosar, Ahmet
    2017 25TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2017,
  • [46] A localised clustering scheme to detect attacks in wireless sensor network
    Joby, P. P.
    Sengottuvelan, P.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 211 - 222
  • [47] Detection and Defense Technology of Blackhole Attacks in Wireless Sensor Network
    Gao, Huisheng
    Wu, Ruping
    Cao, Mingjing
    Zhang, Can
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 601 - 610
  • [48] Computer Network Simulation and Visualization Tool for Educational Purpose
    Jovanovic, Nenad
    Jovanovic, Zoran
    Popovic, Oliver
    Stankovic, Ivan
    Zakic, Aleksandar
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 579 - 582
  • [49] tcsBU: a tool to extend TCS network layout and visualization
    dos Santos, Antonio Murias
    Cabezas, Maria Pilar
    Tavares, Ana Isabel
    Xavier, Raquel
    Branco, Madalena
    BIOINFORMATICS, 2016, 32 (04) : 627 - 628
  • [50] Practical Defenses Against Pollution Attacks in Wireless Network Coding
    Dong, Jing
    Curtmola, Reza
    Nita-Rotaru, Cristina
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)