An investigation of unauthorised use of wireless networks in adelaide, South Australia

2Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Pudney, P., & Slay, J. (2005). An investigation of unauthorised use of wireless networks in adelaide, South Australia. In Lecture Notes in Computer Science (Vol. 3574, pp. 29–39). Springer Verlag. https://doi.org/10.1007/11506157_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free