Abstract
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arbaugh, W.A.: Wireless security is different. Computer 36(8), 99–101 (2003)
Arbaugh, W.A., Shankar, N., Wan, Y.C.J.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications, 44–51 (December 2002)
Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: Proceedings of USENIX, January 20 (1990)
Hannan, M., Turnbull, B.: Wireless network security in Australia: A study of 7 Australian capital cities. In: Proceedings of PACIS 2004, Shanghai, China (2004)
IEEE 1999, ANSI/IEEE Std 802.11, 1999 Edition, LAN MAN Standards Committee of the IEEE Computer Society, USA (1999)
Lemos, R.: Catching wireless hackers in the act, updated 02/09/2002, ZDNet Australia, viewed 10/03/2004 (2002), http://www.zdnet.com.au/news/security/0,2000061744,20267853,00.htm
Petroni, N.L., Arbaugh, W.A.: The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy Magazine 1(1), 28–36 (2003)
Phifer, L.: 2002, Understanding wireless LAN vulnerabilities. Business Communications Review, 26–32 (September 2003)
Poulsen, K.: Wi-Fi honeypots a new hacker trap, updated 29/07/2002, SecurityFocus, viewed 23/02/2004 (2002), http://www.securityfocus.com/news/552
Shipley, P.: Open WLANs: the early results of wardriving, viewed 25/08/2004 (2001), http://www.dis.org/filez/openlans.pdf
Spitzner, L.: Honeypots: definitions and value of honeypots, updated 29/04/2003, viewed 10/03/2004 (2003a), http://www.tracking-hackers.com/papers/honeypots.html
Spitzner, L.: Honeypots: tracking hackers. Addison-Wesley, Boston (2003b)
Stoll, C.: The Cuckoo’s Egg: tracking a spy through the maze of computer espionage. Pan Books, London (1989)
Tenebris Technologies Inc. Tenebris Wireless Honeypot Project: Assessing the threat against wireless access points, updated 19/11/2002, Ottawa, Canada, viewed 4/08/2004 (2002), http://www.tenebris.ca/docs/TWHP20021119.pdf
Turnbull, B., Nicholson, D., Slay, J.: Wireless Network Security A Practical Summary of 802.11b in Adelaide, Australia. In: Proceedings of 4th Australian Information Warfare & IT Security Conference, Adelaide, Australia, November 20-21 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pudney, P., Slay, J. (2005). An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. In: Boyd, C., González Nieto, J.M. (eds) Information Security and Privacy. ACISP 2005. Lecture Notes in Computer Science, vol 3574. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11506157_3
Download citation
DOI: https://doi.org/10.1007/11506157_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26547-4
Online ISBN: 978-3-540-31684-8
eBook Packages: Computer ScienceComputer Science (R0)