Detection of traffic anomalies in the home Wi-Fi network using Waidps and Nzyme utilities

DOI: 10.31673/2409-7292.2022.040004

Authors

  • І. М. Лавровський, (Lavrovsky I. M.) State University of Telecommunications, Kyiv
  • Я. С. Дунаєв, (Dunayev Ya. S.) State University of Telecommunications, Kyiv
  • В. П. Коліда, (Kolida V. P.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2022.040004

Abstract

The article examines Waidps and Nzyme utilities used for monitoring wireless networks. Some basic WLAN terms were described with possible attacks on WLANs in general and how dangerous they are. It has been studied how each of the utilities works: its capabilities, disadvantages and the order of application.

Keywords: WLAN, Wi-Fi, Waidps, Nzyme, traffic anomaly, attack, protection.

References
1. Андрєєв В.І., Хорошко В.О., Чередниченко В.С., Шелест М.Є. Основи інформаційної безпеки; за ред. В.О. Хорошка. – [2-е вид.]. – К.: Вид. ДУІКТ, 2009. – 292 с.
2. Glore, N. & Mishra, A., Chapter 11 «Privacy and Security in WiMAX Networks» in «WiMAX Standards and Security» (Edited by M. Ilyas & S. Ahson) – Boca Raton, Florida: CRC Press, 2008. ISBN 978-1-4200-4523-9
3. M. Gast, 802.11 Wireless networks: The definitive guide. O’Reilly & Associates, Inc., Sebastopol, 2002.
4. “What is 802.11 wireless?.” http://technet.microsoft.com/en-us/library/ cc785885(v=ws.10).aspx.
5. “DHCP starvation attack.” http://www.networkdictionary.com/networking/DHCPStarvationAttack.php.
6. S. DeFino, B. Kaufman, N. Valenteen, and L. Greenblatt, Official Certified Ethical Hacker Review Guide. Cengage Learning, 2009.

Published

2022-12-14

Issue

Section

Articles