Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Analyzing Kleinberg's (and other) small-world Models
Proceedings of the twenty-third annual ACM symposium on Principles of distributed computing
IEEE Security and Privacy
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Proceedings of the 2004 ACM workshop on Rapid malcode
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Location Privacy in Mobile Systems: A Personalized Anonymization Model
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Mobile Contagion: Simulation of Infection and Defense
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Requirements on Worm Mitigation Technologies in MANETS
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Analysis of a Wi-Fi hotspot network
WiTMeMo '05 Papers presented at the 2005 workshop on Wireless traffic measurements and modeling
Modeling epidemic spreading in mobile environments
Proceedings of the 4th ACM workshop on Wireless security
The Final Nail in WEP's Coffin
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Mobile Networks and Applications - Special issue: Wireless mobile wireless applications and services on WLAN hotspots
A preliminary investigation of worm infections in a bluetooth environment
Proceedings of the 4th ACM workshop on Recurring malcode
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
The spoofer project: inferring the extent of source address filtering on the internet
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Searching for privacy: design and implementation of a p3p-enabled search engine
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Your 80211 wireless network has no clothes
IEEE Wireless Communications
On the detection and origin identification of mobile worms
Proceedings of the 2007 ACM workshop on Recurring malcode
Dynamic pharming attacks and locked same-origin policies for web browsers
Proceedings of the 14th ACM conference on Computer and communications security
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Risks of the CardSpace Protocol
ISC '09 Proceedings of the 12th International Conference on Information Security
Automating the injection of believable decoys to detect snooping
Proceedings of the third ACM conference on Wireless network security
Modeling worm propagation through hidden wireless connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Mobile location tracking in metro areas: malnets and others
Proceedings of the 17th ACM conference on Computer and communications security
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
Proceedings of the 26th Annual Computer Security Applications Conference
An 802.11 MAC layer covert channel
Wireless Communications & Mobile Computing
A system for generating and injecting indistinguishable network decoys
Journal of Computer Security
Hi-index | 0.00 |
The growing popularity of wireless networks and mobile devices is starting to attract unwanted attention especially as potential targets for malicious activities reach critical mass. In this study, we try to quantify the threat from large-scale distributed attacks on wireless networks, and, more specifically, wifi networks in densely populated metropolitan areas. We focus on three likely attack scenarios: "wildfire" worms that can spread contagiously over and across wireless LANs, coordinated citywide phishing campaigns based on wireless spoofing, and rogue systems for compromising location privacy in a coordinated fashion. The first attack illustrates how dense wifi deployment may provide opportunities for attackers who want to quickly compromise large numbers of machines. The last two attacks illustrate how botnets can amplify wifi vulnerabilities, and how botnet power is amplified by wireless connectivity. To quantify these threats, we rely on real-world data extracted from wifi maps of large metropolitan areas in the States and Singapore. Our results suggest that a carefully crafted wireless worm can infect up to 80% of all wifi connected hosts in some metropolitan areas within 20 minutes, and that an attacker can launch phishing attacks or build a tracking system to monitor the location of 10-50% of wireless users in these metropolitan areas with just 1,000 zombies under his control.