An investigation of unauthorised use of wireless networks in adelaide, south australia

  • Authors:
  • Phillip Pudney;Jill Slay

  • Affiliations:
  • School of Computer and Information Science, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, South Australia;School of Computer and Information Science, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, South Australia

  • Venue:
  • ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts.