A study on Wi-Fi hacking attack using web
Pages 464 - 471
Abstract
Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. These attacks by the attackers hacked into other servers within the same IP segment after that ARP Spoofing by inserting malicious code associated with a particular Web server intercepts Web Traffic. In this paper, Log in Smart Phone, Tablet PC and Laptop is based, SNS and web site. At this point, Network Packet analysis tools to analyze the contents of the Packet and Encrypted website hacking content and ID, password by hacking incident triggers. Smart Phone, Tablet PC and laptop are presented in the study of security measures for the incident. In this study, Smart Phone, Tablet PC and laptop will contribute that network security Enhance to the development of Hack defense technology.
References
[1]
Teail, J.: If you can not fix security holes drilled away the eternal smart 'half'. Harald Economy (May 2011).
[2]
Orebaugh, A., Ramirez, G., Burke, J., Beale, J.: Wireshark and Ethereal network protocol analyzer toolkit. Syngress, 52-53 (2007).
[3]
Kalakota, R., Robinson, M.: M-Business: Race to the Mobility. McGraw-Hill Companies, New York (2001).
[4]
Chun, W.-S., Park, D.-W.: Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network. IJCSNS International Journal of Computer Science and Network Security 9(12), 291-298 (2009).
[5]
Song, J.-y., Park, D.-w.: A Study of Packet Analysis in Smart Phone Internet Access. The Korean Institute of Maritime Information and Commucation Sciences, 229-232 (October 2010).
[6]
Yao, Y., Yang, W., Yao, Y., Li, Y.: A switch-based ARP attack containment strategy. In: Communication Systems, Networks and Applications (ICCSNA), pp. 123-126 (June 2010).
[7]
Lim, C., Lee, W., Jo, T.-C.: An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks. The Korean Institute of Information Scientists and Engineers 16(6), 631-751 (2010).
[8]
Sung-Ryong, K., von Phishing, Z.S.: IT and Raw, pp. 1-359 (February 2010).
Index Terms
- A study on Wi-Fi hacking attack using web
Index terms have been assigned to the content through auto-classification.
Recommendations
Exploring Defense of SQL Injection Attack in Penetration Testing
SQLIA is adopted to attack websites with and without confidential information. Hackers utilized the compromised website as intermediate proxy to attack others for avoiding being committed of cyber-criminal and also enlarging the scale of Distributed ...
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks
The motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Published: 22 September 2011
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024