UPM Institutional Repository

Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks


Malekzadeh, Mina and Abd Ghani, Abdul Azim and Subramaniam, Shamala (2010) Design of cyberwar laboratory exercises to implement common security attacks against IEEE 802.11 wireless networks. Journal of Computer Systems, Networks, and Communications, 2010. art. no. 218271. pp. 1-15. ISSN 1687-7381; ESSN: 1687-739X


In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.

Download File

[img] PDF
Restricted to Repository staff only

Download (9MB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.1155/2010/218271
Publisher: Hindawi Publishing Corporation
Keywords: Wireless network; IEEE 802.11; Cyberwar laboratory exercises; Wireless network security
Depositing User: Nabilah Mustapa
Date Deposited: 08 Jun 2016 08:28
Last Modified: 08 Jun 2016 08:28
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.1155/2010/218271
URI: http://psasir.upm.edu.my/id/eprint/22444
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item