All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

New Techniques of IEEE 802.11 Family Hotspots Attacks, Principles and Defense

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60076658%3A12310%2F15%3A43890300" target="_blank" >RIV/60076658:12310/15:43890300 - isvavai.cz</a>

  • Result on the web

    <a href="http://connection.ebscohost.com/c/articles/108722958/new-techniques-ieee-802-11-family-hotspots-attacks-principles-defense" target="_blank" >http://connection.ebscohost.com/c/articles/108722958/new-techniques-ieee-802-11-family-hotspots-attacks-principles-defense</a>

  • DOI - Digital Object Identifier

Alternative languages

  • Result language

    angličtina

  • Original language name

    New Techniques of IEEE 802.11 Family Hotspots Attacks, Principles and Defense

  • Original language description

    Today many places in the world allow paid internet connection via wireless hotspots. These solutions are available in places such as hotels, airports and conference halls. Because a wireless hotspot is accessible for any new potential user, common security techniques based on WPA/WPA2 encryption cannot be used. In the last few years a new type of an attack, based on DNS tunneling has been described. We will focus on detail analysis of this attack and we will propose a possible defense strategy. DNS tunneling attack has been implemented in several applications and inspired us to look at another type of a wireless hotspot attack. We will describe in detail all parts of the solution necessary to understand the defense against this type of an attack. At this time, there is no way to prevent this attack, except switching off all unencrypted common wireless hotspots infrastructures.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015)

  • ISBN

    978-1-910810-29-3

  • ISSN

  • e-ISSN

  • Number of pages

    10

  • Pages from-to

    61-70

  • Publisher name

    ACAD CONFERENCES LTD

  • Place of publication

    NR READING

  • Event location

    Univ Hertfordshire, Hatfield

  • Event date

    Jul 2, 2015

  • Type of event by nationality

    EUR - Evropská akce

  • UT code for WoS article

    000361690600008