An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia

  • Phillip Pudney
  • Jill Slay
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3574)


While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Arbaugh, W.A.: Wireless security is different. Computer 36(8), 99–101 (2003)CrossRefGoogle Scholar
  2. 2.
    Arbaugh, W.A., Shankar, N., Wan, Y.C.J.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications, 44–51 (December 2002)Google Scholar
  3. 3.
    Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: Proceedings of USENIX, January 20 (1990)Google Scholar
  4. 4.
    Hannan, M., Turnbull, B.: Wireless network security in Australia: A study of 7 Australian capital cities. In: Proceedings of PACIS 2004, Shanghai, China (2004)Google Scholar
  5. 5.
    IEEE 1999, ANSI/IEEE Std 802.11, 1999 Edition, LAN MAN Standards Committee of the IEEE Computer Society, USA (1999) Google Scholar
  6. 6.
    Lemos, R.: Catching wireless hackers in the act, updated 02/09/2002, ZDNet Australia, viewed 10/03/2004 (2002),,2000061744,20267853,00.htm
  7. 7.
    Petroni, N.L., Arbaugh, W.A.: The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy Magazine 1(1), 28–36 (2003)CrossRefGoogle Scholar
  8. 8.
    Phifer, L.: 2002, Understanding wireless LAN vulnerabilities. Business Communications Review, 26–32 (September 2003)Google Scholar
  9. 9.
    Poulsen, K.: Wi-Fi honeypots a new hacker trap, updated 29/07/2002, SecurityFocus, viewed 23/02/2004 (2002),
  10. 10.
    Shipley, P.: Open WLANs: the early results of wardriving, viewed 25/08/2004 (2001), Scholar
  11. 11.
    Spitzner, L.: Honeypots: definitions and value of honeypots, updated 29/04/2003, viewed 10/03/2004 (2003a),
  12. 12.
    Spitzner, L.: Honeypots: tracking hackers. Addison-Wesley, Boston (2003b)Google Scholar
  13. 13.
    Stoll, C.: The Cuckoo’s Egg: tracking a spy through the maze of computer espionage. Pan Books, London (1989)Google Scholar
  14. 14.
    Tenebris Technologies Inc. Tenebris Wireless Honeypot Project: Assessing the threat against wireless access points, updated 19/11/2002, Ottawa, Canada, viewed 4/08/2004 (2002),
  15. 15.
    Turnbull, B., Nicholson, D., Slay, J.: Wireless Network Security A Practical Summary of 802.11b in Adelaide, Australia. In: Proceedings of 4th Australian Information Warfare & IT Security Conference, Adelaide, Australia, November 20-21 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Phillip Pudney
    • 1
  • Jill Slay
    • 1
  1. 1.School of Computer and Information Science, Advanced Computing Research CentreUniversity of South AustraliaMawson Lakes

Personalised recommendations