A Theoretical Analysis of Different Hacking Techniques in Wireless Networks 

Abstract

Over the course of past few decades to today's world, even though the usage of computers is increasing rapidly, the users hesitate to store their personal information in their computers because of the security issues of computing. The security issues are embossed because of the hackers. Hackers are also the programmers who unethically make use of our personal information, they may steal it and use for some unwanted purpose. They are greatly motivated by a massive amount of profit, challenge, strong efforts, to assist in performing illegal activities. All hackers do not follow a same technique to perform illegal tasks. It will vary depending upon the security of information and the depth of the content involved in it. There are a large number of hacking techniques available in wireless networks. In this theoretical analysis, the systematic methodology of various techniques that the hacker follows to attack a machine or sensitive information of the users has been scrutinized.

Authors and Affiliations

Mr. S. Manimaran , S. Kaviya , S. Josphin Anitha , S. Meiyappan

Keywords

Related Articles

DYNAMIC ANALYSIS OF LOCATION TRACKING USING MICROADDRESS RECORDER

The Location Tracking can be considered as one of the most advanced, innovative and practical Location based Services. A place is very important entity to a user with a semantic meaning such as “You are at your Home”,” Y...

Security against attacks in TOR networks

TOR( The Onion Router) network is a system that provide anonymity for its client by routing the client packets via various volunteering networks, such routing conceals the clients location & activity thus making traf...

A Taxonomy of High Level Software Clones

The idea of software clones is linked with similarity, which can occur at various levels of abstraction. Simple clones i.e. clones at lower levels of abstraction are classified in literature, however; high level clones a...

A HYBRID APPROACH FOR CLUSTERING BASED ON COMBINATIONAL ALGORITHMS

Data clustering helps one discern the structure of and simplify the complexity of massive quantities of data. It is a common technique for statistical data analysis and is used in many fields, including machine learning,...

An Improved Algorithm for Text Document Clustering

Due to the advancement of internet, the volume of the electronic documents available on the web is increasing day by day. Document clustering plays important role in organization and summarization of these documents. Thu...

Download PDF file
  • EP ID EP100911
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Mr. S. Manimaran, S. Kaviya, S. Josphin Anitha, S. Meiyappan (2015). A Theoretical Analysis of Different Hacking Techniques in Wireless Networks . International Journal of Computer Science & Engineering Technology, 6(9), 575-579. https://europub.co.uk/articles/-A-100911