EC2ND 2005 pp 125-136 | Cite as

Wily Attackers Seek Wireless Networks in Perth, Western Australia for Easy Targets

  • Suen Yek
Conference paper


Four rounds of passive wireless packet sniffing were conducted in Perth, Western Australia over two years to determine the nature of wireless network activity occurring in the area and to identify the basic security weaknesses. Trends in the gathered information are discussed in this paper with focus on the application of the Wired Equivalent Privacy and masking of the network name, which are the only security weaknesses detectable by the passive packet sniffer used. The results show that while the detected wireless uptake is growing, mitigation of these basic security weaknesses are declining. Although these results do not conclude on the level of security used in the detected wireless networks, this research highlights the proliferation of opportunities for wily attackers to compromise exposed corporate networks.


wireless local area network security Kismet passive packet sniffing wireless security options information broadcasting masking network presence 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

6. References

  1. [1]
    Fluher, S., Mantin, I., & Shamir, A. (2001). Penetration testing: weaknesses in the key scheduling algorithm of RC4. Retrieved 31 March, 2004, from Scholar
  2. [2]
    Hegerle, B., & Bruestle, J. (2004). AirSnort (Version 0.2.3a).Google Scholar
  3. [3]
    Pfleeger, C., & Pfleeger, S. (2003). Security in computing (3rd ed.). New Jersey: Pearson Education Inc.Google Scholar
  4. [4]
    Valli, C., & Wolski, P. (2004). 802.11b wireless networks insecure at any speed. Paper presented at the SAM2004, Las Vegas.Google Scholar
  5. [5]
    Australian Communications Authority. (1997). Telecommunications ACT 1997. Retrieved November 4, 2004, from Scholar
  6. [6]
    The Certified Wireless Network Professional Training & Certification Program. (2003). Certified wireless network administrator: Official study guide. Georgia: Planet3 Wireless Inc.Google Scholar
  7. [7]
    Kershaw, M. (2004). Kismet (Version 2004-04-R1).Google Scholar
  8. [8]
    Welch, D. J., & Lathrop, S. (2003). A survey of 802. 11a wireless security threats and security mechanisms. New York: Information Technology and Operations Center.Google Scholar
  9. [9]
    Webb, S. (2003). Identifying trends in 802.11b networks in Perth. Paper presented at the Australian Computer Network, Information & Forensics Conference, Perth.Google Scholar
  10. [10]
    Yek, S., & Bolan, C. (2004, 26 November). An analysis of security in 802.11b and 802.1lg wireless networks in Perth, W.A. Paper presented at the 2nd Australian Computer Network, Information & Forensics Conference, Perth, W.A.Google Scholar
  11. [11]
    Milner, M. (2004). Netstumbler (Version 0.4).Google Scholar
  12. [12]
    SourceForge. (2004). Wellenreiter (Version 1.9).Google Scholar
  13. [13]
    Yek, S., & Bolan, C. (2003). A comparative study of wireless scans conducted in Perth, Western Australia and their network security implications (report). Perth: Edith Cowan University.Google Scholar

Copyright information

© Springer-Verlag London Limited 2006

Authors and Affiliations

  • Suen Yek
    • 1
  1. 1.School of Computer and Information ScienceEdith Cowan UniversityPerthWestern Australia

Personalised recommendations