Vulnerability Analysis and Testing of Wireless Networks through Warstorming

Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya
{"title":"Vulnerability Analysis and Testing of Wireless Networks through Warstorming","authors":"Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya","doi":"10.1109/ICACC-202152719.2021.9708344","DOIUrl":null,"url":null,"abstract":"With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Advances in Computing and Communications (ICACC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACC-202152719.2021.9708344","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.
基于Warstorming的无线网络漏洞分析与测试
随着世界迅速转向数字和无线技术,为了避免冲突和保护数据,必须考虑可见性和脆弱性,因为安全是需要解决的主要问题。该系统通过编程的无人机系统(UAS)测试无线网络,该系统检测并帮助分析获得的数据集,例如接入点的位置、媒体访问控制(MAC)地址、身份验证、电源、隐私和密码设置,然后对其进行过滤和分类,以热图和柱状图的形式直观地表示。该模型的后一种工作涉及各种攻击,如去认证攻击、信标攻击、探针攻击和流氓接入点,这些攻击有助于通信干扰、拒绝服务(DoS)、接入点复制和相同的日志数据;这些展示了安全性的强度,并且可以开发用于防御目的和威胁分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信