National Repository of Grey Literature 4 records found  Search took 0.00 seconds. 
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.
Data and Privacy Protection in Smart Transport Services
Lővinger, Norbert ; Dzurenda, Petr (referee) ; Malina, Lukáš (advisor)
Inteligentné prepravné služby sú inovatívne spôsoby prepravy cestujúcich. Prinášajú množstvo výhod vrátane zvýšeného užívateľského pohodlia, zvýšenej bezpečnosti, vyššej efektívnosti alebo lepšej udržateľnosti. Množstvo snímačov a jednotiek zhromažďuje obrovské množstvo údajov vrátane osobných informácií používateľov. Ak tieto získané údaje nebudú chránené, môže to mať vážne dôsledky. Či už v rámci služieb, ako sú chytré parkovacie služby alebo služby zdieľaného využívania vozidiel, ktoré sú súčasťou inteligentných služieb, je potrebné zaviesť opatrenia a techniky na zabezpečenie ochrany týchto údajov. V tejto diplomovej práci sú ďalej rozpracované a podrobnejšie analyzované technológie na zvýšenie ochrany súkromia, ktoré by pri správnej implementácii mohli ochrániť údaje pred viacerými kybernetickými útokmi. S využitím týchto techník ochrany súkromia údajov je opísaných niekoľko fáz procesu zdieľania vozidiel, v ktorých boli tieto nástroje implementované ako proof-of-concept v programovacom jazyku Python. Celkovo bolo vytvorených a vyhodnotených 5 fáz, z ktorých sú vypracované závery. Technológie na zvýšenie ochrany súkromia sú vhodné pre služby zdieľania vozidiel, ak sa použijú správnym spôsobom.
Detection Of Fake Access Points
Lővinger, Norbert
Wireless networks have become a common part of our everyday life. This paper describes the cyber-attacks that employ fake access points. These types of attacks are dangerous for users due open communication medium and automatic connection of end stations. In order to prevent attacks, we can implement Wireless Intrusion Detection System to monitor a wireless network. In this article, we analyze Kismet system in experimental testbed that prevents fake access points attacks.
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.