National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.
Analýza a prevence podvržení falešného přístupového bodu
PÍCHA, David
This thesis begins with a general security of Wi-Fi router. Specifically, I deal with vulnerabilities that an attacker can use to set up a rogue access point. In theoretical part I describe the striker's methodology in the act. In the other important part of work i point out on the legislation which is in this proces violated. The main practical part is a simulation of attack with a pre-arranged group of people. The final outcome of the work are the results of simulation and informations earned from survey.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.