Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Mwathi, D.G."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Attack Susceptibility of Known Attacks on IEEE 802.11 Public WLAN
    (Chuka University, 2016) Mwathi, D.G.; Opiyo, E.; Odongo, O.
    Besides WLAN networks popularity in many places, they have security concerns. Whereas efforts have been made to address the security concerns, design flaws in the security mechanisms of IEEE 802.11 standard such as support for vulnerable authentication methods, and poor configurations give rise to a number of potential attacks. Consequently, readily available WLAN attack software tools make exploitation of these weaknesses relatively easy. This paper describes various WLAN attacks together with the vulnerabilities exploited and analyzes the attack susceptibility based on availability of attack tools and ease of their usage in the context of developing countries. The researcher analyzed attack susceptibility of 30 attack tools. Findings revealed that there are many tools that can be used to exploit WLAN vulnerabilities to launch attacks. The attack susceptibility of denial of service, man in the middle and cipher suite attacks were high. Many of the attack tools were open source, multi-platform and downloadable from the vendor website which made their usage level high. The high attack susceptibility suggested that the risk of attack is quite high in developing countries where institutions allocate low budgets on computer and network security design and implementation. Although all risks in using a WLAN network cannot be mitigated, keeping up-to date and implementing all reasonable measures should make WLAN reasonably safe from attack. Institutions need to prioritise and allocate reasonable resources to protecting WLANs against attacks.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback