loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Jonny Milliken and Alan Marshall

Affiliation: Queens University Belfast, United Kingdom

Keyword(s): WLAN, 802.11, Intrusion Detection Systems, Network Security, Kismet.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Intrusion Detection & Prevention ; Wireless Network Security

Abstract: At present there is no common means for establishing the security performance of wireless local area networks (WLANs) against threats. Furthermore, there has been little investigation into whether security performance is reliant on network topography. Consequently this paper advocates that for a range of WLAN infrastructure topographies (home, enterprise & open-access) there can be significant diversity in terms of resources, equipment, users and most importantly security, which can in turn influence attack detection performance. In order to demonstrate these detection differences, a novel framework for evaluating network security performance (the Threat-Victim Table) is developed. This framework is applied to a range of WLAN topographies using an open source (Kismet) Wireless Intrusion Detection System. Three Kismet components are utilised; client, server and drone, to represent typical IDS deployment configurations for these topographies. Analysis of the security capability of Kism et is derived as an example of this framework, for qualifying network security performance against security threats and also to assess the priority level of these vulnerabilities. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.117.71.239

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Milliken, J. and Marshall, A. (2010). THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 37-42. DOI: 10.5220/0002935400370042

@conference{secrypt10,
author={Jonny Milliken. and Alan Marshall.},
title={THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={37-42},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002935400370042},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Milliken, J.
AU - Marshall, A.
PY - 2010
SP - 37
EP - 42
DO - 10.5220/0002935400370042
PB - SciTePress