ANALYSIS OF WIRELESS CLIENTS’ SECURITY
Journal Title: Современные информационные технологии и ИТ-образование - Year 2018, Vol 14, Issue 4
Abstract
For today, each of us is using wireless communication capabilities. Almost anywhere in cities such as Moscow you can find an access point and access to the Internet. Often people use open access points in transport, parks, shopping centers or cafes. But in such cases, wireless network clients are particularly at risk of being attacked by intruders and losing personal data. This article discusses the security of wireless clients, as well as the vulnerability of wireless Wi-Fi networks. This vulnerability can be exploited as a result of the new library features for capturing network traffic named as libpcap. This library allows not only to intercept the traffic of wireless networks, but also to send packets to the network using the network card driver. The article describes the method of amplifying the signal of access points, as well as disconnecting wireless clients from the network and further reconnecting them to unauthorized access points. This study illustrates the possible scheme of the attacker's actions and the situation of the attack on the client. The result of the study is the answer to the question whether the ability to send packets to the network programmatically is a potential threat to customers. The information obtained as a result of research and data collection is processed. The article also contains statistics on the successful amplification of the signal strength of the access point and the statistics of successful reconnection of clients to an access point with a weak signal strength, which was increased by the attacker programmatically. The statistics are for customers with different versions of the Android OS, depending on the characteristics of the software that a potential attacker may use to perform this type of attack.
Authors and Affiliations
Elena Baranova, Sergey Zareshin
THE ELECTRONIC BOOK OF EDUCATIONAL TRAINING TASKS ON PARALLEL PROGRAMMING BASED ON THE MPI 2.0 STANDARD
We discuss one of approaches to the development of educational parallel software and describe the Programming Taskbook for MPI-2 (http://ptaskbook.com/ru/ptformpi2/), a courseware that includes 250 training tasks on vari...
SPACE MONITORING OF THE LARGEST AGRICULTURAL REGION IN THE INTERESTS OF ITS SUSTAINABLE DEVELOPMENT
The ways of creation and application of technologies of complex information support and monitoring of large agricultural territories are used to create basic thematically oriented means of solving problems of managing su...
THE FREE AND PROPRIETARY COMPILERS C(C++) AND FORTRAN AT DEVELOPMENT OF EFFECTIVE COMPUTING APPLICATIONS
The work presented by authors is devoted to features of implementation of algorithms of calculus mathematics with the aid of free and proprietary compilers. The analysis of speed of consecutive and parallel applications...
SOFTWARE FOR IMAGING DATA FOR THE SYSTEM OF SUPPORT OF DECISION-MAKING IN THE REGIONAL SYSTEM OF EDUCATION
The article discusses the use of comparative evaluation of regional education systems for preparing decision-making in the regional education management system using ICT and information visualization methods, obtained as...
ON INTERFACES OF INFORMATION NETWORKS OF THE DIGITAL ECONOMY
The principal issue of telecommunications (information networks) as a decisive link in the digital economy is considered. The interfaces of information networks are studied in detail, which ensures the interaction of ind...