{"title":"Windows环境下无线攻击仿真器的实现与实验","authors":"Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim","doi":"10.1109/ICITCS.2013.6717803","DOIUrl":null,"url":null,"abstract":"As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Implementation and Experiment of Wireless Attack Emulator on Windows Environment\",\"authors\":\"Doyoung Chung, Sokjoon Lee, Sin-Hyo Kim\",\"doi\":\"10.1109/ICITCS.2013.6717803\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.\",\"PeriodicalId\":239663,\"journal\":{\"name\":\"International Conference on IT Convergence and Security\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on IT Convergence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICITCS.2013.6717803\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on IT Convergence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICITCS.2013.6717803","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Implementation and Experiment of Wireless Attack Emulator on Windows Environment
As a wireless mobile communication technology has been improved, the WLAN technology is widely spread. On the other hand, the threat on WLAN has been gradually increased. Thus, finding vulnerabilities in the WLAN network is important for an administrator. In this paper, we propose WLAN attack emulator and its results. Our new attack emulator supports more various attack type than a previous attack emulator and also runs in windows OS while the previous one only runs in Linux OS. With these two improvements, this emulator would allow administrator to find out the vulnerabilities in his own network easily.