Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Edith Cowan University

2003

Computer networks

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb Jan 2003

Wireless Local Area Network Security : An Investigation Into Security Tool Usage In Wireless Networks, Susan Webb

Theses : Honours

Many organisations and individuals installing wireless local area networks (WLANs), which are based on the IEEE 802.11 b standard, have little understanding of the security issues that surround this technology.

This study was initiated to determine how WLAN security issues affect organisations in Perth, Western Australia. The scope of the study was restricted to 802.llb WLANs operating in infrastructure mode, where all traffic is transmitted by wireless access points (APs). This study was conducted in two phases. The general aims of the first phase were to determine the number of detectable WLANs in the Perth Central Business District (CBD) and …


Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta Jan 2003

Determining The Effectiveness Of Deceptive Honeynets, Nirbhay Gupta

Theses: Doctorates and Masters

Over the last few years, incidents of network based intrusions have rapidly increased, due to the increase and popularity of various attack tools easily available for download from the Internet. Due to this increase in intrusions, the concept of a network defence known as Honeypots developed. These honeypots are designed to ensnare attackers and monitor their activities. Honeypots use the principles of deception such as masking, mimicry, decoying, inventing, repackaging and dazzling to deceive attackers. Deception exists in various forms. It is a tactic to survive and defeat the motives of attackers. Due to its presence in the nature, deception …