loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jonny Milliken and Alan Marshall

Affiliation: Queens University Belfast, United Kingdom

ISBN: 978-989-8425-18-8

Keyword(s): WLAN, 802.11, Intrusion Detection Systems, Network Security, Kismet.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention ; Wireless Network Security

Abstract: At present there is no common means for establishing the security performance of wireless local area networks (WLANs) against threats. Furthermore, there has been little investigation into whether security performance is reliant on network topography. Consequently this paper advocates that for a range of WLAN infrastructure topographies (home, enterprise & open-access) there can be significant diversity in terms of resources, equipment, users and most importantly security, which can in turn influence attack detection performance. In order to demonstrate these detection differences, a novel framework for evaluating network security performance (the Threat-Victim Table) is developed. This framework is applied to a range of WLAN topographies using an open source (Kismet) Wireless Intrusion Detection System. Three Kismet components are utilised; client, server and drone, to represent typical IDS deployment configurations for these topographies. Analysis of the security capability of Kisme t is derived as an example of this framework, for qualifying network security performance against security threats and also to assess the priority level of these vulnerabilities. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.172.217.40

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Milliken J.; Marshall A. and (2010). THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 37-42. DOI: 10.5220/0002935400370042

@conference{secrypt10,
author={Jonny Milliken and Alan Marshall},
title={THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={37-42},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002935400370042},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies
SN - 978-989-8425-18-8
AU - Milliken, J.
AU - Marshall, A.
PY - 2010
SP - 37
EP - 42
DO - 10.5220/0002935400370042

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.