Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
Wireless LAN security and laboratory designs
Journal of Computing Sciences in Colleges
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Laboratory experiments for network security instruction
Journal on Educational Resources in Computing (JERIC)
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Analysis of the effect of security on data and voice traffic in WLAN
Computer Communications
A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP
ICISS '08 Proceedings of the 2008 International Conference on Information Science and Security
Integrated Wireless Rogue Access Point Detection and Counterattack System
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Laboratory design for wireless network attacks
Proceedings of the 5th annual conference on Information security curriculum development
Impacts and solutions of control packets vulnerabilities with IEEE 802.11 MAC
Wireless Communications & Mobile Computing - Next Generation Wireless Communications and Mobile Computing-Networking Technologies
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
Computer Standards & Interfaces
Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
Solutions to Security and Privacy Issues in Mobile Social Networking
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04
Hi-index | 0.00 |
In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-themiddle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.