Skip to main content
Book cover

EC2ND 2005 pp 125–136Cite as

Wily Attackers Seek Wireless Networks in Perth, Western Australia for Easy Targets

  • Conference paper

Abstract

Four rounds of passive wireless packet sniffing were conducted in Perth, Western Australia over two years to determine the nature of wireless network activity occurring in the area and to identify the basic security weaknesses. Trends in the gathered information are discussed in this paper with focus on the application of the Wired Equivalent Privacy and masking of the network name, which are the only security weaknesses detectable by the passive packet sniffer used. The results show that while the detected wireless uptake is growing, mitigation of these basic security weaknesses are declining. Although these results do not conclude on the level of security used in the detected wireless networks, this research highlights the proliferation of opportunities for wily attackers to compromise exposed corporate networks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6. References

  1. Fluher, S., Mantin, I., & Shamir, A. (2001). Penetration testing: weaknesses in the key scheduling algorithm of RC4. Retrieved 31 March, 2004, from http://lists.insecure.org/lists/pen-test/2001/Aug/0012.html

    Google Scholar 

  2. Hegerle, B., & Bruestle, J. (2004). AirSnort (Version 0.2.3a).

    Google Scholar 

  3. Pfleeger, C., & Pfleeger, S. (2003). Security in computing (3rd ed.). New Jersey: Pearson Education Inc.

    Google Scholar 

  4. Valli, C., & Wolski, P. (2004). 802.11b wireless networks insecure at any speed. Paper presented at the SAM2004, Las Vegas.

    Google Scholar 

  5. Australian Communications Authority. (1997). Telecommunications ACT 1997. Retrieved November 4, 2004, from http://www.austlii.edu.au/au/legis/cth/conso_lact/tal997214/

    Google Scholar 

  6. The Certified Wireless Network Professional Training & Certification Program. (2003). Certified wireless network administrator: Official study guide. Georgia: Planet3 Wireless Inc.

    Google Scholar 

  7. Kershaw, M. (2004). Kismet (Version 2004-04-R1).

    Google Scholar 

  8. Welch, D. J., & Lathrop, S. (2003). A survey of 802. 11a wireless security threats and security mechanisms. New York: Information Technology and Operations Center.

    Google Scholar 

  9. Webb, S. (2003). Identifying trends in 802.11b networks in Perth. Paper presented at the Australian Computer Network, Information & Forensics Conference, Perth.

    Google Scholar 

  10. Yek, S., & Bolan, C. (2004, 26 November). An analysis of security in 802.11b and 802.1lg wireless networks in Perth, W.A. Paper presented at the 2nd Australian Computer Network, Information & Forensics Conference, Perth, W.A.

    Google Scholar 

  11. Milner, M. (2004). Netstumbler (Version 0.4).

    Google Scholar 

  12. SourceForge. (2004). Wellenreiter (Version 1.9).

    Google Scholar 

  13. Yek, S., & Bolan, C. (2003). A comparative study of wireless scans conducted in Perth, Western Australia and their network security implications (report). Perth: Edith Cowan University.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Yek, S. (2006). Wily Attackers Seek Wireless Networks in Perth, Western Australia for Easy Targets. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_13

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_13

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics