New Techniques of IEEE 802.11 Family Hotspots Attacks, Principles and Defense
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60076658%3A12310%2F15%3A43890300" target="_blank" >RIV/60076658:12310/15:43890300 - isvavai.cz</a>
Výsledek na webu
<a href="http://connection.ebscohost.com/c/articles/108722958/new-techniques-ieee-802-11-family-hotspots-attacks-principles-defense" target="_blank" >http://connection.ebscohost.com/c/articles/108722958/new-techniques-ieee-802-11-family-hotspots-attacks-principles-defense</a>
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
New Techniques of IEEE 802.11 Family Hotspots Attacks, Principles and Defense
Popis výsledku v původním jazyce
Today many places in the world allow paid internet connection via wireless hotspots. These solutions are available in places such as hotels, airports and conference halls. Because a wireless hotspot is accessible for any new potential user, common security techniques based on WPA/WPA2 encryption cannot be used. In the last few years a new type of an attack, based on DNS tunneling has been described. We will focus on detail analysis of this attack and we will propose a possible defense strategy. DNS tunneling attack has been implemented in several applications and inspired us to look at another type of a wireless hotspot attack. We will describe in detail all parts of the solution necessary to understand the defense against this type of an attack. At this time, there is no way to prevent this attack, except switching off all unencrypted common wireless hotspots infrastructures.
Název v anglickém jazyce
New Techniques of IEEE 802.11 Family Hotspots Attacks, Principles and Defense
Popis výsledku anglicky
Today many places in the world allow paid internet connection via wireless hotspots. These solutions are available in places such as hotels, airports and conference halls. Because a wireless hotspot is accessible for any new potential user, common security techniques based on WPA/WPA2 encryption cannot be used. In the last few years a new type of an attack, based on DNS tunneling has been described. We will focus on detail analysis of this attack and we will propose a possible defense strategy. DNS tunneling attack has been implemented in several applications and inspired us to look at another type of a wireless hotspot attack. We will describe in detail all parts of the solution necessary to understand the defense against this type of an attack. At this time, there is no way to prevent this attack, except switching off all unencrypted common wireless hotspots infrastructures.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
IN - Informatika
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2015
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015)
ISBN
978-1-910810-29-3
ISSN
—
e-ISSN
—
Počet stran výsledku
10
Strana od-do
61-70
Název nakladatele
ACAD CONFERENCES LTD
Místo vydání
NR READING
Místo konání akce
Univ Hertfordshire, Hatfield
Datum konání akce
2. 7. 2015
Typ akce podle státní příslušnosti
EUR - Evropská akce
Kód UT WoS článku
000361690600008