Attack Susceptibility of Known Attacks on IEEE 802.11 Public WLAN

dc.contributor.authorMwathi, D.G.
dc.contributor.authorOpiyo, E.
dc.contributor.authorOdongo, O.
dc.date.accessioned2025-06-05T08:00:21Z
dc.date.available2025-06-05T08:00:21Z
dc.date.issued2016
dc.descriptiondgmwathi@chuka.ac.ke
dc.description.abstractBesides WLAN networks popularity in many places, they have security concerns. Whereas efforts have been made to address the security concerns, design flaws in the security mechanisms of IEEE 802.11 standard such as support for vulnerable authentication methods, and poor configurations give rise to a number of potential attacks. Consequently, readily available WLAN attack software tools make exploitation of these weaknesses relatively easy. This paper describes various WLAN attacks together with the vulnerabilities exploited and analyzes the attack susceptibility based on availability of attack tools and ease of their usage in the context of developing countries. The researcher analyzed attack susceptibility of 30 attack tools. Findings revealed that there are many tools that can be used to exploit WLAN vulnerabilities to launch attacks. The attack susceptibility of denial of service, man in the middle and cipher suite attacks were high. Many of the attack tools were open source, multi-platform and downloadable from the vendor website which made their usage level high. The high attack susceptibility suggested that the risk of attack is quite high in developing countries where institutions allocate low budgets on computer and network security design and implementation. Although all risks in using a WLAN network cannot be mitigated, keeping up-to date and implementing all reasonable measures should make WLAN reasonably safe from attack. Institutions need to prioritise and allocate reasonable resources to protecting WLANs against attacks.
dc.identifier.citationMwathi, D.G., Opiyo, E., & Odongo, O. (2016). Attack susceptibility of known attacks on IEEE 802.11 public WLAN. In: Isutsa, D.K. and Githae, E.W. Proceedings of the Second Chuka University International Research Conference held in Chuka University, Chuka, Kenya from 28th to 30th October, 2015. 318-325 pp.
dc.identifier.urihttps://repository.chuka.ac.ke/handle/123456789/19972
dc.language.isoen
dc.publisherChuka University
dc.subjectWLAN attack susceptibility
dc.subjectCipher suite attacks
dc.subjectMan in the middle attacks
dc.subjectDenial of service attacks
dc.subjectWLAN vulnerabilities
dc.subjectAttack tools
dc.titleAttack Susceptibility of Known Attacks on IEEE 802.11 Public WLAN
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
318-325.pdf
Size:
634.21 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: