An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts.
Unable to display preview. Download preview PDF.
- 2.Arbaugh, W.A., Shankar, N., Wan, Y.C.J.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications, 44–51 (December 2002)Google Scholar
- 3.Cheswick, B.: An evening with Berferd in which a cracker is lured, endured, and studied. In: Proceedings of USENIX, January 20 (1990)Google Scholar
- 4.Hannan, M., Turnbull, B.: Wireless network security in Australia: A study of 7 Australian capital cities. In: Proceedings of PACIS 2004, Shanghai, China (2004)Google Scholar
- 5.IEEE 1999, ANSI/IEEE Std 802.11, 1999 Edition, LAN MAN Standards Committee of the IEEE Computer Society, USA (1999) Google Scholar
- 6.Lemos, R.: Catching wireless hackers in the act, updated 02/09/2002, ZDNet Australia, viewed 10/03/2004 (2002), http://www.zdnet.com.au/news/security/0,2000061744,20267853,00.htm
- 8.Phifer, L.: 2002, Understanding wireless LAN vulnerabilities. Business Communications Review, 26–32 (September 2003)Google Scholar
- 9.Poulsen, K.: Wi-Fi honeypots a new hacker trap, updated 29/07/2002, SecurityFocus, viewed 23/02/2004 (2002), http://www.securityfocus.com/news/552
- 10.Shipley, P.: Open WLANs: the early results of wardriving, viewed 25/08/2004 (2001), http://www.dis.org/filez/openlans.pdfGoogle Scholar
- 11.Spitzner, L.: Honeypots: definitions and value of honeypots, updated 29/04/2003, viewed 10/03/2004 (2003a), http://www.tracking-hackers.com/papers/honeypots.html
- 12.Spitzner, L.: Honeypots: tracking hackers. Addison-Wesley, Boston (2003b)Google Scholar
- 13.Stoll, C.: The Cuckoo’s Egg: tracking a spy through the maze of computer espionage. Pan Books, London (1989)Google Scholar
- 14.Tenebris Technologies Inc. Tenebris Wireless Honeypot Project: Assessing the threat against wireless access points, updated 19/11/2002, Ottawa, Canada, viewed 4/08/2004 (2002), http://www.tenebris.ca/docs/TWHP20021119.pdf
- 15.Turnbull, B., Nicholson, D., Slay, J.: Wireless Network Security A Practical Summary of 802.11b in Adelaide, Australia. In: Proceedings of 4th Australian Information Warfare & IT Security Conference, Adelaide, Australia, November 20-21 (2003)Google Scholar