Laboratory design for wireless network attacks

  • Authors:
  • Xiaohong Yuan;Omari T. Wright;Huiming Yu;Kenneth A. Williams

  • Affiliations:
  • North Carolina A&T State University, Greensboro, NC;North Carolina A&T State University, Greensboro, NC;North Carolina A&T State University, Greensboro, NC;North Carolina A&T State University, Greensboro, NC

  • Venue:
  • Proceedings of the 5th annual conference on Information security curriculum development
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

There has been an increased awareness on the importance of a hands-on laboratory component in information security education in recent years. We developed a series of laboratory exercises for wireless network security. These laboratory exercises introduce to the students the following wireless network attacks: Wardriving, Eavesdropping, WEP Key Cracking/Decryption, Man in the Middle, MAC Spoofing, ARP Cache Poisoning, and ARP Request Replay. Open source tools such as Aircrack-ng, Cain and Abel, and Mac Makeup are used in these laboratory exercises to demonstrate how these attacks are conducted. The laboratory exercises were presented to two information security related courses at this university. The student feedback was very positive. Future work will include refining the laboratory design, conducting evaluation of the exercises extensively, developing more laboratory exercises for wireless network security and developing laboratory exercises for the Linux platform.