MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "e65d920f-665e-4f63-805c-31a09d09cec0"}, "_deposit": {"id": "3457", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3457"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3457", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "IEEE 802.11 Attacks and Defenses", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand availability. Possible threats come fromvulnerabilities of security protocols. The rapidgrowth in the use of wireless networks attracts theattackers as a target. Wireless traffic consists ofmanagement, control and data frames. An attackercan manipulate these frames that affect the dataintegrity, confidentiality, authentication andavailability. A real Wireless Local Area (WLAN)testbed setup is proposed for performing thevulnerabilities of well-known attacks pertaining toIEEE 802.11 network and monitoring the analysis ofpackets. Based on these categories of vulnerabilitiesand threats, Confidentiality Attack: Evil TwinAvailability Attacks: Deauthentication Disassociationand Café Latte and Authentication Attack: Dictionaryattack are conducted through demonstrations in areal environment by using proposed setup."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "IEEE 802.11"}, {"interim": "Media Access Control (MAC)"}, {"interim": "DoS"}, {"interim": "Disassociation"}, {"interim": "Deauthentation"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "ICCA 2019 Proceedings Book-pages-197-202.pdf", "filesize": [{"value": "692 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 692000.0, "url": {"url": "https://meral.edu.mm/record/3457/files/ICCA 2019 Proceedings Book-pages-197-202.pdf"}, "version_id": "56e4cf1d-e845-4440-bcbe-f82a57130db3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Seventeenth International Conference on Computer Applications(ICCA 2019)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, May Aye Chan"}, {"subitem_authors_fullname": "Thant, Khin Phyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-02-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1205"}, "item_title": "IEEE 802.11 Attacks and Defenses", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003457", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3457", "relation": {}, "relation_version_is_last": true, "title": ["IEEE 802.11 Attacks and Defenses"], "weko_shared_id": -1}
IEEE 802.11 Attacks and Defenses
http://hdl.handle.net/20.500.12678/0000003457
http://hdl.handle.net/20.500.12678/00000034573382dc6f-29ab-4bc9-86b6-6b5da21f6182
e65d920f-665e-4f63-805c-31a09d09cec0
Name / File | License | Actions |
---|---|---|
ICCA 2019 Proceedings Book-pages-197-202.pdf (692 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | IEEE 802.11 Attacks and Defenses | |||||
Language | en | |||||
Publication date | 2019-02-27 | |||||
Authors | ||||||
Aung, May Aye Chan | ||||||
Thant, Khin Phyo | ||||||
Description | ||||||
Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand availability. Possible threats come fromvulnerabilities of security protocols. The rapidgrowth in the use of wireless networks attracts theattackers as a target. Wireless traffic consists ofmanagement, control and data frames. An attackercan manipulate these frames that affect the dataintegrity, confidentiality, authentication andavailability. A real Wireless Local Area (WLAN)testbed setup is proposed for performing thevulnerabilities of well-known attacks pertaining toIEEE 802.11 network and monitoring the analysis ofpackets. Based on these categories of vulnerabilitiesand threats, Confidentiality Attack: Evil TwinAvailability Attacks: Deauthentication Disassociationand Café Latte and Authentication Attack: Dictionaryattack are conducted through demonstrations in areal environment by using proposed setup. | ||||||
Keywords | ||||||
IEEE 802.11, Media Access Control (MAC), DoS, Disassociation, Deauthentation | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/1205 | |||||
Journal articles | ||||||
Seventeenth International Conference on Computer Applications(ICCA 2019) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |