Publication detail

Malware injection in wireless networks

KAČIC, M. HENZL, M. JURNEČKA, P. HANÁČEK, P.

Original Title

Malware injection in wireless networks

English Title

Malware injection in wireless networks

Type

conference paper

Language

en

Original Abstract

Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We alsodiscuss its impact on users at home and wide corporate wireless network.

English abstract

Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We alsodiscuss its impact on users at home and wide corporate wireless network.

Keywords

Wireless network security, Malware injection,Group key vulnerability

RIV year

2013

Released

14.09.2013

Publisher

Institute of Electrical and Electronics Engineers

Location

Berlin

ISBN

978-1-4799-1426-5

Book

Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)

Edition

Volume 1

Edition number

NEUVEDEN

Pages from

483

Pages to

487

Pages count

5

URL

Documents

BibTex


@inproceedings{BUT103455,
  author="Matej {Kačic} and Martin {Henzl} and Peter {Jurnečka} and Petr {Hanáček}",
  title="Malware injection in wireless networks",
  annote="Nowadays we use the 802.11i standard, which is considered safe for now. In 2010,
the Hole 196 vulnerability of Group Transient Key was discovered, which allows an
undetectable insider ARP poisoning attack. On this ground we have founded the
possibility of malware injection into wireless communication with purpose of
avoiding intrusion detection system. This paper describes creation and injection
of valid 802.11i frames with malware payload. We alsodiscuss its impact on users
at home and wide corporate wireless network.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)",
  chapter="103455",
  edition="Volume 1",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2013",
  month="september",
  pages="483--487",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}