Academic literature on the topic 'Deauthentication attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deauthentication attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Deauthentication attack"

1

Kristiyanto, Yogi, and Ernastuti E. "Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test." CommIT (Communication and Information Technology) Journal 14, no. 1 (May 31, 2020): 45. http://dx.doi.org/10.21512/commit.v14i1.6337.

Full text
Abstract:
The research aims to know the level of security of WiFi connectivity against deauthentication attacks on Internet of Things (IoT)-based devices. It is done through testing using an external penetration test method. The external penetration test simulates a real external attack without information about the target system and network given. The process starts from accessing the device through Internet or WiFi by the test target. At the same time, the attacker performs Denial-of-Service (DoS) attacks onWiFi. The attacker uses Arduino ESP8266 NodeMCU WiFi with Lua programming. To record WiFi activities, the researchers use CommView for WiFi V. 7.0, and the target is Internet Protocol (IP) camera device. The result shows that the communication of the test target with the gateway is lost, but the Media Access Control (MAC) of the test target is still registered at the gateway. Deauthentication attacks cause communication paralysis, and several changes occur, such as an increase in data rate, and change in frequency channel, Distribution System (DS) status, retry bits in frame management, and the sequence number.
APA, Harvard, Vancouver, ISO, and other styles
2

Cheema, Rupinder, Divya Bansal, and Sanjeev Sofat. "Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks." International Journal of Computer Applications 23, no. 7 (June 30, 2011): 7–15. http://dx.doi.org/10.5120/2901-3801.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Milliken, Jonny, Valerio Selis, Kian Meng Yap, and Alan Marshall. "Impact of Metric Selection on Wireless DeAuthentication DoS Attack Performance." IEEE Wireless Communications Letters 2, no. 5 (October 2013): 571–74. http://dx.doi.org/10.1109/wcl.2013.072513.130428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bahaweres, R. B., S. Mokoginta, and M. Alaydrus. "Comparison of methods for localizing the source position of deauthentication attacks on WAP 802.11n using Chanalyzer and Wi-Spy 2.4x." Journal of Physics: Conference Series 801 (January 2017): 012056. http://dx.doi.org/10.1088/1742-6596/801/1/012056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dubrovin, V. I., B. V. Petryk, and G. V. Nelasa. "Detection of DOS-attacks in network traffic by the method of Wavelet-transformation." Modern information security, 2020. http://dx.doi.org/10.31673/2409-7292.2020.023746.

Full text
Abstract:
Network traffic data analysis is very important for detecting DOS attacks and malicious anomalies. Many data mining techniques have been found to manage data and use it for security purposes. Fast and accurate search for content-based queries is critical to making such numerous data streams useful. This paper proposes an analysis of the deauthentication attack and the localization of the anomaly data by the wavelet transform method.
APA, Harvard, Vancouver, ISO, and other styles
6

Корольков, Роман Юрійович, and Сергій Вікторович Куцак. "The features of a deauthentication attack implementation in networks 802.11." Ukrainian Information Security Research Journal 21, no. 3 (September 27, 2019). http://dx.doi.org/10.18372/2410-7840.21.13953.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Deauthentication attack"

1

Stehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.

Full text
Abstract:
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Deauthentication attack"

1

Marais, Stephan, Marijke Coetzee, and Franz Blauw. "Simultaneous Deauthentication of Equals Attack." In Security, Privacy, and Anonymity in Computation, Communication, and Storage, 545–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-68884-4_45.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Deauthentication attack"

1

Mar, Jeich, Yow-Cheng Yeh, and I.-Fan Hsiao. "An ANFIS-IDS against deauthentication DOS attacks for a WLAN." In Its Applications (Isita2010). IEEE, 2010. http://dx.doi.org/10.1109/isita.2010.5654405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huhta, Otto, Prakash Shrestha, Swapnil Udar, Mika Juuti, Nitesh Saxena, and N. Asokan. "Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2016. http://dx.doi.org/10.14722/ndss.2016.23199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nguyen, T. D., D. Nguyen, B. N. Tran, H. Vu, and N. Mittal. "A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks." In 17th International Conference on Computer Communications and Networks 2008. IEEE, 2008. http://dx.doi.org/10.1109/icccn.2008.ecp.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography