A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection

The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education. Th...

Full description

Autores:
Madrid Molina, Juan Manuel
Tipo de recurso:
Part of book
Fecha de publicación:
2015
Institución:
Universidad ICESI
Repositorio:
Repositorio ICESI
Idioma:
eng
OAI Identifier:
oai:repository.icesi.edu.co:10906/81982
Acceso en línea:
http://hdl.handle.net/10906/81982
http://dx.doi.org/10.4018/978-1-4666-5888-2.ch413
Palabra clave:
Redes inalámbricas
Wi-Fi
Conexiones
Telecomunicaciones
Telecommunication
Rights
openAccess
License
https://creativecommons.org/licenses/by-nc-nd/4.0/
id ICESI2_249d0fc5d45012e3518ddc73e1197925
oai_identifier_str oai:repository.icesi.edu.co:10906/81982
network_acronym_str ICESI2
network_name_str Repositorio ICESI
repository_id_str
dc.title.spa.fl_str_mv A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
title A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
spellingShingle A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
Redes inalámbricas
Wi-Fi
Conexiones
Telecomunicaciones
Telecommunication
title_short A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
title_full A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
title_fullStr A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
title_full_unstemmed A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
title_sort A Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detection
dc.creator.fl_str_mv Madrid Molina, Juan Manuel
dc.contributor.author.spa.fl_str_mv Madrid Molina, Juan Manuel
dc.subject.spa.fl_str_mv Redes inalámbricas
Wi-Fi
Conexiones
Telecomunicaciones
Telecommunication
topic Redes inalámbricas
Wi-Fi
Conexiones
Telecomunicaciones
Telecommunication
description The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education. The goal of this article is to present the reader with a survey of the currently documented detectable attacks to infrastructure-mode 802.11 wireless networks, and a proposal of mechanisms and metrics that can be used to detect such attacks. The attacks and their detection methods are divided in seven categories: Denial-of service, traffic analysis attacks, passive eavesdropping, attacks against WEP, attacks against WPA and WPA2 in pre-shared key (PSK) and Enterprise modes, and man-in-the-middle attacks.
publishDate 2015
dc.date.issued.none.fl_str_mv 2015-01-01
dc.date.accessioned.none.fl_str_mv 2017-08-24T16:35:43Z
dc.date.available.none.fl_str_mv 2017-08-24T16:35:43Z
dc.type.spa.fl_str_mv info:eu-repo/semantics/bookPart
dc.type.coar.none.fl_str_mv http://purl.org/coar/resource_type/c_3248
dc.type.local.spa.fl_str_mv Capítulo de libro
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coarversion.none.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
format http://purl.org/coar/resource_type/c_3248
status_str publishedVersion
dc.identifier.isbn.none.fl_str_mv 9781466658882
dc.identifier.uri.none.fl_str_mv http://hdl.handle.net/10906/81982
dc.identifier.doi.none.fl_str_mv http://dx.doi.org/10.4018/978-1-4666-5888-2.ch413
dc.identifier.instname.none.fl_str_mv instname: Universidad Icesi
dc.identifier.reponame.none.fl_str_mv reponame: Biblioteca Digital
dc.identifier.repourl.none.fl_str_mv repourl: https://repository.icesi.edu.co/
identifier_str_mv 9781466658882
instname: Universidad Icesi
reponame: Biblioteca Digital
repourl: https://repository.icesi.edu.co/
url http://hdl.handle.net/10906/81982
http://dx.doi.org/10.4018/978-1-4666-5888-2.ch413
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.ispartof.none.fl_str_mv Encyclopedia of Information Science and Technology, Third Edition
dc.rights.uri.none.fl_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.license.none.fl_str_mv Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
dc.rights.coar.none.fl_str_mv http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv https://creativecommons.org/licenses/by-nc-nd/4.0/
Atribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 4207-4220 páginas
dc.format.medium.spa.fl_str_mv Digital
dc.coverage.spatial.spa.fl_str_mv Hershey de Lat: 38 55 00 N degrees minutes Lat: 38.9167 decimal degrees Long: 121 59 00 W degrees minutes Long: -121.9833 decimal degrees
dc.publisher.spa.fl_str_mv IGI Global
dc.publisher.faculty.spa.fl_str_mv Facultad de Ingeniería
dc.publisher.program.spa.fl_str_mv Ingeniería Telemática
dc.publisher.department.spa.fl_str_mv Departamento Tecnologías De Información Y Comunicaciones Tic
dc.publisher.place.spa.fl_str_mv Hershey
institution Universidad ICESI
bitstream.url.fl_str_mv http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/81982/3/documento.html
http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/81982/2/license.txt
bitstream.checksum.fl_str_mv 39586c82a151ba25e50d692f7394f4d9
8a4605be74aa9ea9d79846c1fba20a33
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
repository.name.fl_str_mv Biblioteca Digital - Universidad icesi
repository.mail.fl_str_mv cdcriollo@icesi.edu.co
_version_ 1814094876756672512
spelling Madrid Molina, Juan Manueljmadrid@icesi.edu.coHershey de Lat: 38 55 00 N degrees minutes Lat: 38.9167 decimal degrees Long: 121 59 00 W degrees minutes Long: -121.9833 decimal degrees2017-08-24T16:35:43Z2017-08-24T16:35:43Z2015-01-019781466658882http://hdl.handle.net/10906/81982http://dx.doi.org/10.4018/978-1-4666-5888-2.ch413instname: Universidad Icesireponame: Biblioteca Digitalrepourl: https://repository.icesi.edu.co/The 802.11 wireless network revolution has not come without trouble. Since their creation, wireless networks have been plagued with security problems, derived from poor initial design of 802.11 security mechanisms, accelerated deployment and adoption of the technology, and lack of user education. The goal of this article is to present the reader with a survey of the currently documented detectable attacks to infrastructure-mode 802.11 wireless networks, and a proposal of mechanisms and metrics that can be used to detect such attacks. The attacks and their detection methods are divided in seven categories: Denial-of service, traffic analysis attacks, passive eavesdropping, attacks against WEP, attacks against WPA and WPA2 in pre-shared key (PSK) and Enterprise modes, and man-in-the-middle attacks.4207-4220 páginasDigitalengIGI GlobalFacultad de IngenieríaIngeniería TelemáticaDepartamento Tecnologías De Información Y Comunicaciones TicHersheyEncyclopedia of Information Science and Technology, Third EditionEL AUTOR, expresa que la obra objeto de la presente autorización es original y la elaboró sin quebrantar ni suplantar los derechos de autor de terceros, y de tal forma, la obra es de su exclusiva autoría y tiene la titularidad sobre éste. PARÁGRAFO: en caso de queja o acción por parte de un tercero referente a los derechos de autor sobre el artículo, folleto o libro en cuestión, EL AUTOR, asumirá la responsabilidad total, y saldrá en defensa de los derechos aquí autorizados; para todos los efectos, la Universidad Icesi actúa como un tercero de buena fe. Esta autorización, permite a la Universidad Icesi, de forma indefinida, para que en los términos establecidos en la Ley 23 de 1982, la Ley 44 de 1993, leyes y jurisprudencia vigente al respecto, haga publicación de este con fines educativos Todo persona que consulte ya sea la biblioteca o en medio electrónico podrá copiar apartes del texto citando siempre la fuentes, es decir el título del trabajo y el autor.https://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessAtribuci�n-NoComercial-SinDerivadas 4.0 Internacional (CC BY-NC-ND 4.0)http://purl.org/coar/access_right/c_abf2Redes inalámbricasWi-FiConexionesTelecomunicacionesTelecommunicationA Survey of Attack Mechanisms on Infrastructure-Mode 802.11 Wireless Networks and Their Detectioninfo:eu-repo/semantics/bookParthttp://purl.org/coar/resource_type/c_3248Capítulo de libroinfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/version/c_970fb48d4fbd8a85Comunidad Universidad Icesi - InvestigadoresORIGINALdocumento.htmldocumento.htmltext/html309http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/81982/3/documento.html39586c82a151ba25e50d692f7394f4d9MD53LICENSElicense.txtlicense.txttext/plain1748http://repository.icesi.edu.co/biblioteca_digital/bitstream/10906/81982/2/license.txt8a4605be74aa9ea9d79846c1fba20a33MD5210906/81982oai:repository.icesi.edu.co:10906/819822018-10-04 15:16:56.505Biblioteca Digital - Universidad icesicdcriollo@icesi.edu.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