Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Air Force Institute of Technology

Computer networks--Security measures

2003

Articles 1 - 1 of 1

Full-Text Articles in Engineering

Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon Mar 2003

Characterizing Data Streams Over Ieee 802.11b Ad-Hoc Wireless Networks, John T. Wagnon

Theses and Dissertations

Soon, advancements in data encryption technology will make real-time decryption of the contents of network packets virtually impossible. This research anticipates this development and extracts useful information based on packet level characteristics. Distinguishing characteristics from e-mail, HTTP, print, and FTP applications are identified and analyzed. The analysis of collected data from an ad-hoc wireless network reveals that distinguishing characteristics of network traffic do indeed exist. These characteristics include packet size, packet frequency, inter-packet correlation, and channel utilization. Without knowing the contents of packets or the direction of the traffic flow, the applications accessing the wireless network can be determined.