Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "e65d920f-665e-4f63-805c-31a09d09cec0"}, "_deposit": {"id": "3457", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3457"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3457", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "IEEE 802.11 Attacks and Defenses", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand availability. Possible threats come fromvulnerabilities of security protocols. The rapidgrowth in the use of wireless networks attracts theattackers as a target. Wireless traffic consists ofmanagement, control and data frames. An attackercan manipulate these frames that affect the dataintegrity, confidentiality, authentication andavailability. A real Wireless Local Area (WLAN)testbed setup is proposed for performing thevulnerabilities of well-known attacks pertaining toIEEE 802.11 network and monitoring the analysis ofpackets. Based on these categories of vulnerabilitiesand threats, Confidentiality Attack: Evil TwinAvailability Attacks: Deauthentication Disassociationand Café Latte and Authentication Attack: Dictionaryattack are conducted through demonstrations in areal environment by using proposed setup."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "IEEE 802.11"}, {"interim": "Media Access Control (MAC)"}, {"interim": "DoS"}, {"interim": "Disassociation"}, {"interim": "Deauthentation"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-23"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "ICCA 2019 Proceedings Book-pages-197-202.pdf", "filesize": [{"value": "692 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 692000.0, "url": {"url": "https://meral.edu.mm/record/3457/files/ICCA 2019 Proceedings Book-pages-197-202.pdf"}, "version_id": "56e4cf1d-e845-4440-bcbe-f82a57130db3"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Seventeenth International Conference on Computer Applications(ICCA 2019)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, May Aye Chan"}, {"subitem_authors_fullname": "Thant, Khin Phyo"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2019-02-27"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1205"}, "item_title": "IEEE 802.11 Attacks and Defenses", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003457", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-23"}, "publish_date": "2019-07-23", "publish_status": "0", "recid": "3457", "relation": {}, "relation_version_is_last": true, "title": ["IEEE 802.11 Attacks and Defenses"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

IEEE 802.11 Attacks and Defenses

http://hdl.handle.net/20.500.12678/0000003457
http://hdl.handle.net/20.500.12678/0000003457
3382dc6f-29ab-4bc9-86b6-6b5da21f6182
e65d920f-665e-4f63-805c-31a09d09cec0
None
Preview
Name / File License Actions
ICCA ICCA 2019 Proceedings Book-pages-197-202.pdf (692 Kb)
Publication type
Article
Upload type
Publication
Title
Title IEEE 802.11 Attacks and Defenses
Language en
Publication date 2019-02-27
Authors
Aung, May Aye Chan
Thant, Khin Phyo
Description
Protection of IEEE 802.11 networks meansprotection against attacks on confidentiality, integrityand availability. Possible threats come fromvulnerabilities of security protocols. The rapidgrowth in the use of wireless networks attracts theattackers as a target. Wireless traffic consists ofmanagement, control and data frames. An attackercan manipulate these frames that affect the dataintegrity, confidentiality, authentication andavailability. A real Wireless Local Area (WLAN)testbed setup is proposed for performing thevulnerabilities of well-known attacks pertaining toIEEE 802.11 network and monitoring the analysis ofpackets. Based on these categories of vulnerabilitiesand threats, Confidentiality Attack: Evil TwinAvailability Attacks: Deauthentication Disassociationand Café Latte and Authentication Attack: Dictionaryattack are conducted through demonstrations in areal environment by using proposed setup.
Keywords
IEEE 802.11, Media Access Control (MAC), DoS, Disassociation, Deauthentation
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/1205
Journal articles
Seventeenth International Conference on Computer Applications(ICCA 2019)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 12:58:32.765064
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL