Detail publikace

Malware injection in wireless networks

Originální název

Malware injection in wireless networks

Anglický název

Malware injection in wireless networks

Jazyk

en

Originální abstrakt

Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We alsodiscuss its impact on users at home and wide corporate wireless network.

Anglický abstrakt

Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This paper describes creation and injection of valid 802.11i frames with malware payload. We alsodiscuss its impact on users at home and wide corporate wireless network.

BibTex


@inproceedings{BUT103455,
  author="Matej {Kačic} and Martin {Henzl} and Peter {Jurnečka} and Petr {Hanáček}",
  title="Malware injection in wireless networks",
  annote="Nowadays we use the 802.11i standard, which is considered safe for now. In 2010,
the Hole 196 vulnerability of Group Transient Key was discovered, which allows an
undetectable insider ARP poisoning attack. On this ground we have founded the
possibility of malware injection into wireless communication with purpose of
avoiding intrusion detection system. This paper describes creation and injection
of valid 802.11i frames with malware payload. We alsodiscuss its impact on users
at home and wide corporate wireless network.",
  address="Institute of Electrical and Electronics Engineers",
  booktitle="Proceedings of the 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)",
  chapter="103455",
  edition="Volume 1",
  howpublished="print",
  institution="Institute of Electrical and Electronics Engineers",
  year="2013",
  month="september",
  pages="483--487",
  publisher="Institute of Electrical and Electronics Engineers",
  type="conference paper"
}