Sciweavers

ACISP
2005
Springer

An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia

14 years 6 months ago
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia
While it is known that wireless networks experience unauthorised connections, little is known about the nature or frequency of the connections. This study seeks to investigate the unauthorised use of wireless networks, and to dispel the myth that attacks on wireless networks are simply an attempt to obtain Internet access. Three wireless honeypots were deployed to collect data about unauthorised use of wireless networks in the Adelaide CBD. The data collected from the honeypots was then analysed for trends and evidence of malicious activity. The results of the study show that insecure wireless networks regularly experience unauthorised activity, ranging from harmless probes through to intrusion attempts.
Phillip Pudney, Jill Slay
Added 26 Jun 2010
Updated 26 Jun 2010
Type Conference
Year 2005
Where ACISP
Authors Phillip Pudney, Jill Slay
Comments (0)