Abstract
Four rounds of passive wireless packet sniffing were conducted in Perth, Western Australia over two years to determine the nature of wireless network activity occurring in the area and to identify the basic security weaknesses. Trends in the gathered information are discussed in this paper with focus on the application of the Wired Equivalent Privacy and masking of the network name, which are the only security weaknesses detectable by the passive packet sniffer used. The results show that while the detected wireless uptake is growing, mitigation of these basic security weaknesses are declining. Although these results do not conclude on the level of security used in the detected wireless networks, this research highlights the proliferation of opportunities for wily attackers to compromise exposed corporate networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
6. References
Fluher, S., Mantin, I., & Shamir, A. (2001). Penetration testing: weaknesses in the key scheduling algorithm of RC4. Retrieved 31 March, 2004, from http://lists.insecure.org/lists/pen-test/2001/Aug/0012.html
Hegerle, B., & Bruestle, J. (2004). AirSnort (Version 0.2.3a).
Pfleeger, C., & Pfleeger, S. (2003). Security in computing (3rd ed.). New Jersey: Pearson Education Inc.
Valli, C., & Wolski, P. (2004). 802.11b wireless networks insecure at any speed. Paper presented at the SAM2004, Las Vegas.
Australian Communications Authority. (1997). Telecommunications ACT 1997. Retrieved November 4, 2004, from http://www.austlii.edu.au/au/legis/cth/conso_lact/tal997214/
The Certified Wireless Network Professional Training & Certification Program. (2003). Certified wireless network administrator: Official study guide. Georgia: Planet3 Wireless Inc.
Kershaw, M. (2004). Kismet (Version 2004-04-R1).
Welch, D. J., & Lathrop, S. (2003). A survey of 802. 11a wireless security threats and security mechanisms. New York: Information Technology and Operations Center.
Webb, S. (2003). Identifying trends in 802.11b networks in Perth. Paper presented at the Australian Computer Network, Information & Forensics Conference, Perth.
Yek, S., & Bolan, C. (2004, 26 November). An analysis of security in 802.11b and 802.1lg wireless networks in Perth, W.A. Paper presented at the 2nd Australian Computer Network, Information & Forensics Conference, Perth, W.A.
Milner, M. (2004). Netstumbler (Version 0.4).
SourceForge. (2004). Wellenreiter (Version 1.9).
Yek, S., & Bolan, C. (2003). A comparative study of wireless scans conducted in Perth, Western Australia and their network security implications (report). Perth: Edith Cowan University.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Yek, S. (2006). Wily Attackers Seek Wireless Networks in Perth, Western Australia for Easy Targets. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_13
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_13
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)