ANALYSIS OF WIRELESS CLIENTS’ SECURITY
Journal Title: Современные информационные технологии и ИТ-образование - Year 2018, Vol 14, Issue 4
Abstract
For today, each of us is using wireless communication capabilities. Almost anywhere in cities such as Moscow you can find an access point and access to the Internet. Often people use open access points in transport, parks, shopping centers or cafes. But in such cases, wireless network clients are particularly at risk of being attacked by intruders and losing personal data. This article discusses the security of wireless clients, as well as the vulnerability of wireless Wi-Fi networks. This vulnerability can be exploited as a result of the new library features for capturing network traffic named as libpcap. This library allows not only to intercept the traffic of wireless networks, but also to send packets to the network using the network card driver. The article describes the method of amplifying the signal of access points, as well as disconnecting wireless clients from the network and further reconnecting them to unauthorized access points. This study illustrates the possible scheme of the attacker's actions and the situation of the attack on the client. The result of the study is the answer to the question whether the ability to send packets to the network programmatically is a potential threat to customers. The information obtained as a result of research and data collection is processed. The article also contains statistics on the successful amplification of the signal strength of the access point and the statistics of successful reconnection of clients to an access point with a weak signal strength, which was increased by the attacker programmatically. The statistics are for customers with different versions of the Android OS, depending on the characteristics of the software that a potential attacker may use to perform this type of attack.
Authors and Affiliations
Elena Baranova, Sergey Zareshin
RESOURCE INTENSITY CALCULATION For TEXTS LANGUAGE IDENTIFICATION PROGRAMS
The article deals with the resource intensity calculation of texts language identification programs depending on their identification methods. The most commonly used methods are described, together with an indication of...
REFACTORING OF THE OPENVZ DRIVER FOR THE OPENNEBULA CLOUD PLATFORM WITHIN THE JINR CLOUD INFRASTRUCTURE PROJECT
This article explores the possibilities of using OpenVZ virtualization technology in the cloud infrastructure of the Joint Institute for Nuclear Research (JINR), built on the OpenNebula platform. OpenNebula is an open a...
ADAPTIVE TRAINING STRATEGY FOR DIGITAL ECONOMY PROBLEMS IN DUBNA STATE UNIVERSITY
The article is devoted to new educational trends in the transition to the digital economy. The development program of digital economy in Russia requires new approaches to training and the use of modern digital technologi...
NETWORK ORGANIZATION AND SYSTEMIC PRINCIPLES OF GOVERNANCE IN RELATIONSHIPS BETWEEN INNOVATIVE BUSINESS AND THE STATE
Network organization and systemic principles of governance in relationships between innovative business and the state are examined on the basis of the innovation clusters formation. The focus is on the formation of innov...
ALGORITHMS FOR THE ROBUST PROPERTIES ANALYSIS OF A MULTI-PURPOSE CONTROL LAWS OF MOVING OBJECTS
The problems of analyzing robust properties for control systems of moving objects are of significant importance in modern control theory. This is because the mathematical models used in the synthesis of control laws are...