Detection of traffic anomalies in the home Wi-Fi network using Waidps and Nzyme utilities
DOI: 10.31673/2409-7292.2022.040004
DOI:
https://doi.org/10.31673/2409-7292.2022.040004Abstract
The article examines Waidps and Nzyme utilities used for monitoring wireless networks. Some basic WLAN terms were described with possible attacks on WLANs in general and how dangerous they are. It has been studied how each of the utilities works: its capabilities, disadvantages and the order of application.
Keywords: WLAN, Wi-Fi, Waidps, Nzyme, traffic anomaly, attack, protection.
References
1. Андрєєв В.І., Хорошко В.О., Чередниченко В.С., Шелест М.Є. Основи інформаційної безпеки; за ред. В.О. Хорошка. – [2-е вид.]. – К.: Вид. ДУІКТ, 2009. – 292 с.
2. Glore, N. & Mishra, A., Chapter 11 «Privacy and Security in WiMAX Networks» in «WiMAX Standards and Security» (Edited by M. Ilyas & S. Ahson) – Boca Raton, Florida: CRC Press, 2008. ISBN 978-1-4200-4523-9
3. M. Gast, 802.11 Wireless networks: The definitive guide. O’Reilly & Associates, Inc., Sebastopol, 2002.
4. “What is 802.11 wireless?.” http://technet.microsoft.com/en-us/library/ cc785885(v=ws.10).aspx.
5. “DHCP starvation attack.” http://www.networkdictionary.com/networking/DHCPStarvationAttack.php.
6. S. DeFino, B. Kaufman, N. Valenteen, and L. Greenblatt, Official Certified Ethical Hacker Review Guide. Cengage Learning, 2009.