[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/2045005.2045068guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A study on Wi-Fi hacking attack using web

Published: 22 September 2011 Publication History

Abstract

Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. These attacks by the attackers hacked into other servers within the same IP segment after that ARP Spoofing by inserting malicious code associated with a particular Web server intercepts Web Traffic. In this paper, Log in Smart Phone, Tablet PC and Laptop is based, SNS and web site. At this point, Network Packet analysis tools to analyze the contents of the Packet and Encrypted website hacking content and ID, password by hacking incident triggers. Smart Phone, Tablet PC and laptop are presented in the study of security measures for the incident. In this study, Smart Phone, Tablet PC and laptop will contribute that network security Enhance to the development of Hack defense technology.

References

[1]
Teail, J.: If you can not fix security holes drilled away the eternal smart 'half'. Harald Economy (May 2011).
[2]
Orebaugh, A., Ramirez, G., Burke, J., Beale, J.: Wireshark and Ethereal network protocol analyzer toolkit. Syngress, 52-53 (2007).
[3]
Kalakota, R., Robinson, M.: M-Business: Race to the Mobility. McGraw-Hill Companies, New York (2001).
[4]
Chun, W.-S., Park, D.-W.: Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network. IJCSNS International Journal of Computer Science and Network Security 9(12), 291-298 (2009).
[5]
Song, J.-y., Park, D.-w.: A Study of Packet Analysis in Smart Phone Internet Access. The Korean Institute of Maritime Information and Commucation Sciences, 229-232 (October 2010).
[6]
Yao, Y., Yang, W., Yao, Y., Li, Y.: A switch-based ARP attack containment strategy. In: Communication Systems, Networks and Applications (ICCSNA), pp. 123-126 (June 2010).
[7]
Lim, C., Lee, W., Jo, T.-C.: An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks. The Korean Institute of Information Scientists and Engineers 16(6), 631-751 (2010).
[8]
Sung-Ryong, K., von Phishing, Z.S.: IT and Raw, pp. 1-359 (February 2010).

Index Terms

  1. A study on Wi-Fi hacking attack using web
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ICHIT'11: Proceedings of the 5th international conference on Convergence and hybrid information technology
      September 2011
      789 pages
      ISBN:9783642240812
      • Editors:
      • Geuk Lee,
      • Daniel Howard,
      • Dominik Ślęzak

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 22 September 2011

      Author Tags

      1. ARP spoofing
      2. SSL
      3. hacking
      4. network packet analysis

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 0
        Total Downloads
      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Dec 2024

      Other Metrics

      Citations

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media