• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 9
  • 7
  • 7
  • 7
  • 7
  • 7
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Using metrics from multiple layers to detect attacks in wireless networks

Aparicio-Navarro, Francisco J. January 2014 (has links)
The IEEE 802.11 networks are vulnerable to numerous wireless-specific attacks. Attackers can implement MAC address spoofing techniques to launch these attacks, while masquerading themselves behind a false MAC address. The implementation of Intrusion Detection Systems has become fundamental in the development of security infrastructures for wireless networks. This thesis proposes the designing a novel security system that makes use of metrics from multiple layers of observation to produce a collective decision on whether an attack is taking place. The Dempster-Shafer Theory of Evidence is the data fusion technique used to combine the evidences from the different layers. A novel, unsupervised and self- adaptive Basic Probability Assignment (BPA) approach able to automatically adapt its beliefs assignment to the current characteristics of the wireless network is proposed. This BPA approach is composed of three different and independent statistical techniques, which are capable to identify the presence of attacks in real time. Despite the lightweight processing requirements, the proposed security system produces outstanding detection results, generating high intrusion detection accuracy and very low number of false alarms. A thorough description of the generated results, for all the considered datasets is presented in this thesis. The effectiveness of the proposed system is evaluated using different types of injection attacks. Regarding one of these attacks, to the best of the author knowledge, the security system presented in this thesis is the first one able to efficiently identify the Airpwn attack.
22

WLAN : Oskyddad och okontrollerad datakommunikation

Horndahl, Charles, Maric, Kristian January 2005 (has links)
<p>This master’s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions:</p><p>- What security weaknesses are present with the WLAN-technology and how can these be avoided?</p><p>- How does the wireless infrastructure in the Jonkoping region look like?</p><p>- Why do companies implement the WLAN-technology?</p><p>- Are the companies aware of the risks involved with WLAN?</p><p>We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures. The second step of the study was to scan the wireless networks in Jonkoping, Gnosjo and Nassjo in order to create a picture of the wireless infrastructure of the region. The third step of the study was to contact companies that we found in the second step for interviews to investigate their awareness of the technology and its weaknesses.</p><p>We found that WLANs and their security measures have weaknesses. The commonly used WEP encryption can quite easily be broken and can lure users into a false sense of security. The study shows that companies are aware of this weakness, but use the encryption be-cause it offers a good level of usability and security. It is a compromise between usability and security. Usability is one of the major factors for companies when implementing wireless networks, companies strive for mobility, easy access and ease of use, which the WLAN technology offers. This has lead to an extended wireless infrastructure in cities within the region where one, with ease, can find wireless networks outside buildings. We have noticed an increase in the security awareness as our empirical findings differ from earlier research conducted in other cities. When these studies are compared you can see a trend where the number of unprotected networks decreases. Our contribution to increased wireless security is a checklist of possible security measures to minimize the security threats.</p> / <p>Denna magisteruppsats undersöker tekniken och säkerhetsmedvetandet gällande trådlösa nätverk (WLAN). Då det tidigare uppmärksammats i media och teori att många trådlösa nätverk står oskyddade har detta skapat intresse att undersöka fenomenet i Jönköpingsregionen. Studien baseras på följande frågeställningar:</p><p>- Vilka säkerhetsluckor finns i WLAN och hur kan dessa undvikas?</p><p>- Hur ser WLAN-infrastrukturen ut i Jönköpingsregionen?</p><p>- Varför implementerar företag WLAN-tekniken?</p><p>- Är företag medvetna om riskerna med trådlösa nätverk?</p><p>För att skapa en helhetsbild har vi genomfört studien i tre steg varav vi, i det första steget, genomfört dataintrång i en kontrollerad miljö för att undersöka svagheterna med säkerhetsfunktionerna som används i trådlösa nätverk. I det andra steget undersökte vi med hjälp av bärbar dator trådlösa nätverk i Jönköping, Gnosjö och Nässjö. Detta för att skapa oss en uppfattning om hur WLAN-infrastrukturen ser ut i dagsläget. Steg tre innebar intervjuer med företag som vi funnit i samband med steg två rörande deras medvetenhet om tekniken och dess brister.</p><p>Teorin och vår empiri gav oss underlag att dra slutsatser utifrån våra frågeställningar. Vi fann att WLAN och dess säkerhetsfunktioner har vissa sårbarheter. Den mest förekommande krypteringstekniken, WEP, kan dekrypteras tämligen enkelt och kan vagga in användarna i en falsk säkerhet. Studien visar att företagen är medvetna om detta, men att det handlar om en medveten kompromiss mellan användarvänlighet och säkerhet. Användarvänligheten står till grund för varför företagen väljer att implementera den trådlösa tekniken. Företag eftersträvar mobilitet, smidighet och enkel access, vilket den trådlösa tekniken erbjuder. Detta har lett till en utökad trådlös infrastruktur i städer runtom i regionen där man med lätthet kan hitta trådlösa nätverk utanför byggnader. Vi har noterat ett ökat säkerhetsmedvetande då våra empiriska resultat skiljer sig något från tidigare undersökningar i andra städer. När dessa ställs mot varandra anar man en trend där antalet oskyddade trådlösa nätverk minskar. Vårt bidrag till ökad trådlös säkerhet är en checklista med möjliga åtgärder för att minimera säkerhetsriskerna.</p>
23

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

Juhlin, Tobias, Wangberg, Dan January 2014 (has links)
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshåli den. Intervjuer, tester och observationer har gjorts för att undersöka problemenmed WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner. / In this report the WPS-function is evaluated due to the vulnerabilty of the protocol.Interviews, tests and observations have been conducted to evaluate the problems withWPS. The tests and interviews conducted indicates that the vulnerability of the WPS-function has been secured with extra functions.
24

Bristfällig säkerhet inom trådlösa routrar med fokus på WPS

Juhlin, Tobias, Wangberg, Dan January 2014 (has links)
I denna rapport undersöks WPS-funktionen då det uppmärksammats säkerhetshål i den. Intervjuer, tester och observationer har gjorts för att undersöka problemen med WPS. De tester och intervjuver som gjorts indikerar att säkerhetsbristen i WPS-funktionen har säkrats upp med extra funktioner. / In this report the WPS-function is evaluated due to the vulnerabilty of the protocol. Interviews, tests and observations have been conducted to evaluate the problems with WPS. The tests and interviews conducted indicates that the vulnerability of the WPS-function has been secured with extra functions.
25

Nástroj pro generování rámců podle standardu 802.11 / Frame Generator Based on 802.11 Standard

Švanda, Pavel January 2013 (has links)
This thesis describes the design and implementation of the generator frames used for information transfer in wireless networks. At the beginning of the thesis there is described the introduction to the issue of data transmission in wireless networks 802.11 and the analysis of existing tools. Then it is designed language for describing the structure of their own frames and designed their own tools. The work also deals with the subsequent implementation of the resulting tool. Finally the results of the test are mentioned.
26

Development of a Client-Side Evil Twin Attack Detection System for Public Wi-Fi Hotspots based on Design Science Approach

Horne, Liliana R. 01 January 2018 (has links)
Users and providers benefit considerably from public Wi-Fi hotspots. Users receive wireless Internet access and providers draw new prospective customers. While users are able to enjoy the ease of Wi-Fi Internet hotspot networks in public more conveniently, they are more susceptible to a particular type of fraud and identify theft, referred to as evil twin attack (ETA). Through setting up an ETA, an attacker can intercept sensitive data such as passwords or credit card information by snooping into the communication links. Since the objective of free open (unencrypted) public Wi-Fi hotspots is to provide ease of accessibility and to entice customers, no security mechanisms are in place. The public’s lack of awareness of the security threat posed by free open public Wi-Fi hotspots makes this problem even more heinous. Client-side systems to help wireless users detect and protect themselves from evil twin attacks in public Wi-Fi hotspots are in great need. In this dissertation report, the author explored the problem of the need for client-side detection systems that will allow wireless users to help protect their data from evil twin attacks while using free open public Wi-Fi. The client-side evil twin attack detection system constructed as part of this dissertation linked the gap between the need for wireless security in free open public Wi-Fi hotspots and limitations in existing client-side evil twin attack detection solutions. Based on design science research (DSR) literature, Hevner’s seven guidelines of DSR, Peffer’s design science research methodology (DSRM), Gregor’s IS design theory, and Hossen & Wenyuan’s (2014) study evaluation methodology, the author developed design principles, procedures and specifications to guide the construction, implementation, and evaluation of a prototype client-side evil twin attack detection artifact. The client-side evil twin attack detection system was evaluated in a hotel public Wi-Fi environment. The goal of this research was to develop a more effective, efficient, and practical client-side detection system for wireless users to independently detect and protect themselves from mobile evil twin attacks while using free open public Wi-Fi hotspots. The experimental results showed that client-side evil twin attack detection system can effectively detect and protect users from mobile evil twin AP attacks in public Wi-Fi hotspots in various real-world scenarios despite time delay caused by many factors.
27

Propagation modeling of wireless systems in shipboard compartments

Chaabane, Adnen 03 1900 (has links)
Approved for public release, distribution is unlimited / In today's navy, it is becoming more and more important to reach all areas onboard a ship with key technical resources. In order to accomplish this goal, the already existing physical networks need to be complemented with wireless capability. A sophisticated Wireless Local Area Network (WLAN) can provide that vital connectivity to the ship's network resources from almost anywhere on the ship. It would allow sailors to access critical information and immediately communicate with others throughout the ship from any standard wireless device (PDA, laptop and many other hand-held devices). In addition, WLANs greatly mitigate problems due to physical damage to wires or fiber optic cables that are used today. Because the navy's emphasis is on building ships with reduced manning, advanced technology, and lower cost in mind, the idea of a WLAN, which has a deep impact on all those areas, has been of a growing interest to the Navy. The purpose of this thesis is to analyze, model, and simulate a wireless environment on board a variety of naval ship compartments, using the Urbana code. Starting from known inputs (frequency, ship compartment geometry, material properties, propagation computation model, and antenna type), analytical results reflecting the propagation mechanisms, coverage area, and security posture of the WLAN are presented. Variable inputs can then be optimized to achieve a desired signal distribution and to meet security requirements for a specific shipboard environment. / Lieutenant Junior Grade, Tunisian Navy
28

AAA架構下情境感知存取控制政策之設計與應用 / Context-aware access control for the AAA architecture

劉安妮, Liu, Annie Unknown Date (has links)
隨著無線網路環境的普及,越來越多行動工作者可以透過隨身的手持設備進行網路漫遊,即時地存取不同的服務。另外亦可以經由公司的虛擬專有網路來存取企業內部資料、電子郵件及其它應用程式。不論是針對企業或是網路服務業者而言,為了要能夠確保網路環境上的安全性,眾多的行動工作者在進行漫遊時,身分必須被驗證,進而才能被授予各項服務的存取權。此外,還必需根據使用者服務使用的情況進行計費,來提升服務提供者的收益。 因此在無線區域網路中,結合一套認證、授權、計費的架構(Authentication, Authorization, Accounting Architecture, AAA Architecture),使得網路服務業者能夠有效地來管理龐大行動工作者的跨網路漫遊服務。 本研究提出一個以情境知覺運算(context-aware computing)為基礎的AAA架構。以情境來設計資源存取政策,因此系統偵測到行動工作者情境上的改變,根據已定義好的存取政策,動態地進行身分驗證及調整授權服務,最後再依不同的服務使用等級、連線時間與網路使用量等來計費。本論文以漫遊服務與企業虛擬專有網路為例,說明在此架構下如何針對不同的情境進行身分認證、與服務授權。 / With the popularity of the Wireless LAN, mobile workers are able to access various services or resources with seamless roaming, as well as mobile VPN, just via their handheld devices. Not only for the corporations but the Internet Service Providers(ISP), a secure and trusted remote access is required. User identity should be authenticated in advance, and the service providers grant or deny mobile users the access to resources according to their statuses. Besides, a usage-based accounting and billing is crucial to provide commercialized services within WLAN, and to benefit those service providers. As a result, a AAA architecture designed for coordinating the authentication, authorization and accounting between different administrative networks is required with urgent need. The objective of this research is to provide a context-aware based AAA architecture which adopts context as the design principle to define access control policies. So the system can detect the changing contexts of mobile workers, re-authenticate user identity, adjust dynamically service permissions in the light of context-based access control policies, and bill the user taking into account the contexts efficiently. In this research, we take examples of roaming services and VPN to describe how the architecture works.
29

WLAN : Oskyddad och okontrollerad datakommunikation

Horndahl, Charles, Maric, Kristian January 2005 (has links)
This master’s thesis investigates the technology and security awareness associated with wireless networks (WLAN). It has been stated by the media and theories that many wireless networks are unprotected. This has sparked an interest to investigate the phenomenon in the Jonkoping region. The study is based on the following research questions: - What security weaknesses are present with the WLAN-technology and how can these be avoided? - How does the wireless infrastructure in the Jonkoping region look like? - Why do companies implement the WLAN-technology? - Are the companies aware of the risks involved with WLAN? We conducted this study in three steps; the first step was to hack a wireless network in a controlled environment in order to investigate the weaknesses of the commonly used security measures. The second step of the study was to scan the wireless networks in Jonkoping, Gnosjo and Nassjo in order to create a picture of the wireless infrastructure of the region. The third step of the study was to contact companies that we found in the second step for interviews to investigate their awareness of the technology and its weaknesses. We found that WLANs and their security measures have weaknesses. The commonly used WEP encryption can quite easily be broken and can lure users into a false sense of security. The study shows that companies are aware of this weakness, but use the encryption be-cause it offers a good level of usability and security. It is a compromise between usability and security. Usability is one of the major factors for companies when implementing wireless networks, companies strive for mobility, easy access and ease of use, which the WLAN technology offers. This has lead to an extended wireless infrastructure in cities within the region where one, with ease, can find wireless networks outside buildings. We have noticed an increase in the security awareness as our empirical findings differ from earlier research conducted in other cities. When these studies are compared you can see a trend where the number of unprotected networks decreases. Our contribution to increased wireless security is a checklist of possible security measures to minimize the security threats. / Denna magisteruppsats undersöker tekniken och säkerhetsmedvetandet gällande trådlösa nätverk (WLAN). Då det tidigare uppmärksammats i media och teori att många trådlösa nätverk står oskyddade har detta skapat intresse att undersöka fenomenet i Jönköpingsregionen. Studien baseras på följande frågeställningar: - Vilka säkerhetsluckor finns i WLAN och hur kan dessa undvikas? - Hur ser WLAN-infrastrukturen ut i Jönköpingsregionen? - Varför implementerar företag WLAN-tekniken? - Är företag medvetna om riskerna med trådlösa nätverk? För att skapa en helhetsbild har vi genomfört studien i tre steg varav vi, i det första steget, genomfört dataintrång i en kontrollerad miljö för att undersöka svagheterna med säkerhetsfunktionerna som används i trådlösa nätverk. I det andra steget undersökte vi med hjälp av bärbar dator trådlösa nätverk i Jönköping, Gnosjö och Nässjö. Detta för att skapa oss en uppfattning om hur WLAN-infrastrukturen ser ut i dagsläget. Steg tre innebar intervjuer med företag som vi funnit i samband med steg två rörande deras medvetenhet om tekniken och dess brister. Teorin och vår empiri gav oss underlag att dra slutsatser utifrån våra frågeställningar. Vi fann att WLAN och dess säkerhetsfunktioner har vissa sårbarheter. Den mest förekommande krypteringstekniken, WEP, kan dekrypteras tämligen enkelt och kan vagga in användarna i en falsk säkerhet. Studien visar att företagen är medvetna om detta, men att det handlar om en medveten kompromiss mellan användarvänlighet och säkerhet. Användarvänligheten står till grund för varför företagen väljer att implementera den trådlösa tekniken. Företag eftersträvar mobilitet, smidighet och enkel access, vilket den trådlösa tekniken erbjuder. Detta har lett till en utökad trådlös infrastruktur i städer runtom i regionen där man med lätthet kan hitta trådlösa nätverk utanför byggnader. Vi har noterat ett ökat säkerhetsmedvetande då våra empiriska resultat skiljer sig något från tidigare undersökningar i andra städer. När dessa ställs mot varandra anar man en trend där antalet oskyddade trådlösa nätverk minskar. Vårt bidrag till ökad trådlös säkerhet är en checklista med möjliga åtgärder för att minimera säkerhetsriskerna.
30

Challenges of Wireless Security in the Healthcare Field : A study on the WPA3 standard

Mironov, Georgiana January 2020 (has links)
The healthcare environment is a complex one, saturated by wireless medical devices and sensitive patient data flowing through the network traffic. With the increased popularity of wireless medical devices in the healthcare domain together with the announcement of the new wireless security standard WPA3 comes a need to prepare for a new generation shift in wireless security. The goal of this study is therefore to investigate what challenges the healthcare sector can encounter when faced with the inevitable transition to WPA3. By performing a literature review on the security state of WPA3 compared to its predecessor and performing qualitative interviews with network technicians working in the healthcare sector, three major challenges were identified. IT professionals in the healthcare domain struggle with integrating legacy software systems, keeping middleware software solutions secure, and with handling hardware medical devices that come with outdated wireless standards. By analysing existing literature, several mitigating actions to battle these challenges were presented in this study.

Page generated in 0.2916 seconds