• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Um esquema de segurança para quadros de controle em redes IEEE 802.11

FRANÇA NETO, Ivan Luiz de 14 August 2015 (has links)
Submitted by Haroudo Xavier Filho (haroudo.xavierfo@ufpe.br) on 2016-03-11T14:34:26Z No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) DissertacaoIvanFranca.pdf: 1367108 bytes, checksum: 8ceed302b395b606d9ac49b5a05987db (MD5) / Made available in DSpace on 2016-03-11T14:34:26Z (GMT). No. of bitstreams: 2 license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) DissertacaoIvanFranca.pdf: 1367108 bytes, checksum: 8ceed302b395b606d9ac49b5a05987db (MD5) Previous issue date: 2015-08-14 / Os quadros de controle IEEE 802.11 desempenham funções importantes na rede sem fio. Dentre elas estão o controle de acesso ao meio de comunicação, a recuperação de quadros armazenados no Ponto de Acesso e a confirmação do recebimento de blocos de quadros ou de certos tipos de quadros. Apesar da importância dos quadros de controle, eles são vulneráveis a ataques de forjação, manipulação e reinjeção devido a inexistência de mecanismos de proteção. Este trabalho propõe um esquema de segurança para quadros de controle em redes IEEE 802.11 a fim de evitar esses ataques. A proposta se diferencia dos trabalhos relacionados por prover um alto grau de segurança em todos os seus módulos com baixo impacto na vazão da rede. Além disso, a proposta não incorre nas fraquezas que eles possuem na contenção dos ataques de reinjeção e no processo de geração e distribuição de chaves. / IEEE 802.11 control frames play important role in the wireless network. Among them are the medium access control, the retrieving of buffered frames in the Access Point, and the acknowledgment of block of frames or certain types of frames. Despite their importance, control frames remain vulnerable to forging, tampering, and replay attacks due to lack of protection mechanisms. This work proposes a security scheme for IEEE 802.11 control frames to prevent such attacks. Our proposal differs from related work by providing a high level of security in all modules along with low impact on network throughput. Furthermore, the proposal avoid the weaknesses that they have in the restraint the replay attacks and in the key generation and distribution process.
2

Einflussfaktoren auf die Wahrnehmung von Unordnung

Kohlmeier, Markus 16 December 2020 (has links)
Der Beitrag untersucht die Wirkung verschiedener Einflussfaktoren auf die Perzeption von Unordnung. Einer Einführung in die theoretische Diskussion rund um die Wirkung von Unordnung auf das urbane Sozialgefüge folgen verschiedene multivariate Berechnungen (N = 2003). Hierzu wird ein additiver Index aus dem Produkt von subjektiver Schwere und perzipierter Häufigkeit verschiedener Erscheinungsformen physischer und sozialer Unordnung gebildet. Die Regressionsergebnisse zeigen, dass die soziale Struktur urbaner Nachbarschaften, der bedingte Erwartungswert für die kollektive Wirksamkeit informeller Sozialkontrolle sowie solche Prädiktoren, welche die Bedeutung des unmittelbaren sozialen Nahraumes für Prozesse kognitiver Dissonanzbewältigung betonen (Viktimisierung, Wohnverhältnis, Kriminalitätseinstellungen), erklären, wann ein Akteur eine Situation als unsicher definiert und infolgedessen Unordnung als Anzeichen von Gefahr interpretiert. Der dem Explanans zugrundeliegende soziale Mechanismus beruht auf der Theorie der Frame-Selektion nach Esser (1991). Die Untersuchung basiert auf der Sicherheitsbefragung der Stadt Leipzig (2011).:1 Einleitung 2 Theorie 2.1 Hunter (1978) 2.2 Wilson und Kelling (1982) 2.3 Exkurs 2.4 Lewis und Salem (1986) 2.5 Skogan (1990) 2.6 Das Konzept der collective efficacy 3 Hypothesen 3.1 Der Grundzusammenhang des theoretischen Modells 3.2 Die Brückenhypothesen des Modells 3.2.1 Direkte und indirekte Viktimisierung 3.2.2 Kriminalitätsfurcht 3.2.3 Medienrezeption 3.2.4 Kontrollvariablen 4 Daten, Operationalisierungen, Methoden 4.1 Daten 4.2 Operationalisierungen 4.2.1 Abhängige Variable(n) 4.2.2 Unabhängige Variablen 4.3 Methoden 5 Auswertung 5.1 Bivariate Ergebnisse 5.2 Multivariate Ergebnisse 6 Fazit und abschließende Bemerkungen 7 Anhang 8 Literaturverzeichnis / This article investigates the influence of various predictors on the perception of disorder. An introduction to the theoretical discussion about the impact of disorder on the urban social structure is followed by different multivariate regressions (N = 2003). The perception of different images of physical and social disorder is measured in terms of the sentimental value of disorder and the perceived frequency of disorder. An additive index using product terms of the sentimental value and the perceived frequency for each image is constructed. The results of the regressions indicate that social structure of urban neighborhoods, collective efficacy, and such predictors which aim at the significance of social proximity (victimization, housing situation, personal crime settings) for processes of cognitive dissonance coping explain when an actor defines a situation as not-secure and subsequently interprets disorder as a symbol of danger. Esser’s (1991) theory of frame-selection functions as the social mechanism of the explanans. The hypotheses are tested on survey data provided by the city of Leipzig (2011).:1 Einleitung 2 Theorie 2.1 Hunter (1978) 2.2 Wilson und Kelling (1982) 2.3 Exkurs 2.4 Lewis und Salem (1986) 2.5 Skogan (1990) 2.6 Das Konzept der collective efficacy 3 Hypothesen 3.1 Der Grundzusammenhang des theoretischen Modells 3.2 Die Brückenhypothesen des Modells 3.2.1 Direkte und indirekte Viktimisierung 3.2.2 Kriminalitätsfurcht 3.2.3 Medienrezeption 3.2.4 Kontrollvariablen 4 Daten, Operationalisierungen, Methoden 4.1 Daten 4.2 Operationalisierungen 4.2.1 Abhängige Variable(n) 4.2.2 Unabhängige Variablen 4.3 Methoden 5 Auswertung 5.1 Bivariate Ergebnisse 5.2 Multivariate Ergebnisse 6 Fazit und abschließende Bemerkungen 7 Anhang 8 Literaturverzeichnis
3

A Study on Fingerprinting of Locally Assigned MAC-Addresses

Djervbrant, Karl-Johan, Häggström, Andreas January 2019 (has links)
The number of WiFi Devices is increasing every day, most people traveling hasa device with a WiFi network card enabled. This is something EffectSoft AB in Halmstad utilizes in their service Flow, to track and count devices. The accuracy of counted devices was however not accurate enough for a commercial use and this is where this candidate Thesis will continue research on how to improve the accuracy. It introduces the fundamental problem on how one cannot directly count transmitted MAC-Addresses to count present devices, since the manufacturers implement features against this such as MAC-Address randomization. It covers how manufacturers are not consistent in their implementation of the IEEE 802.11 standard, how this can be utilized to estimate how many devices are present in the networkwith three different approaches. It also concludes that Control Frame Attacks is not a viable approach any longer to count devices and the best method for counting devices are a combination of Passive Probe Request Analysis techniques. / Mängden enheter som kommunicerar över WiFi ökar dagligen och idag bär de flesta människor en enhet med ett aktiverat WiFi-nätverkskort. Detta använder EffectSoft AB, ett företag i Halmstad till sin teknik Flow för att räkna mobila enheter. Noggrannheten för beräkningen är dock inte tillräckligt bra för att produkten ska kunna vara applicerbar på marknaden och därav handlar denna kandidatuppsatsen om beräkning av mobila enheter. Denna rapport presenterar de problem som man stöter på vid beräkning av mobila enheter som till exempel randomisering av MAC-Adresser. Den täcker även hur tillverkare inte är konsekventa i sin implementation av IEEE 802.11 standarden och hur detta kan utnyttjas genom tre metoderför beräkning av antal mobila enheter. Det fastställs att Control Frame Attack inte längre är en möjlig metod för syftet samt att den bästa metoden för beräkning avantalet mobila enheter är en kombination av olika passiva Probe Request analyser.

Page generated in 0.0725 seconds