Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya
{"title":"Vulnerability Analysis and Testing of Wireless Networks through Warstorming","authors":"Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya","doi":"10.1109/ICACC-202152719.2021.9708344","DOIUrl":null,"url":null,"abstract":"With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advances in Computing and Communications (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC-202152719.2021.9708344","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.