Wireless honeypots: Survey and assessment

Noor Al-Gharabally, Nosayba El-Sayed, Sara Al-Mulla, Imtiaz Ahmad

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The great recent advancements in wireless networking have drawn attention to the privacy and security problems that accompanied them. Wireless Honeypots have been introduced as tools whose value lies in the unauthorized attempts to use them. They have been successfully deployed in areas where they were able to trap hackers into virtual networks, and collect useful information about their attempted attacks. In this paper, we discuss attacks against wireless networks and classify the different existing Wireless Honeypots methods that have been proposed for defense against these attacks. We assess each wireless honeypots method by comparing their strengths and weaknesses in terms of the methods of deception used with them, authentication protocols implemented, logging facilities, and several other attributes.

Original languageEnglish
Title of host publicationProceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09
Pages45-52
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event2009 Conference on Information Science, Technology and Applications, ISTA '09 - Kuwait, Kuwait
Duration: 20 Mar 200922 Mar 2009

Other

Other2009 Conference on Information Science, Technology and Applications, ISTA '09
CountryKuwait
CityKuwait
Period20/3/0922/3/09

Fingerprint

Authentication
Wireless networks
Network protocols

Keywords

  • Deception
  • Honeypots
  • Survey
  • Wireless

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Al-Gharabally, N., El-Sayed, N., Al-Mulla, S., & Ahmad, I. (2009). Wireless honeypots: Survey and assessment. In Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09 (pp. 45-52) https://doi.org/10.1145/1551950.1551969

Wireless honeypots : Survey and assessment. / Al-Gharabally, Noor; El-Sayed, Nosayba; Al-Mulla, Sara; Ahmad, Imtiaz.

Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09. 2009. p. 45-52.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Al-Gharabally, N, El-Sayed, N, Al-Mulla, S & Ahmad, I 2009, Wireless honeypots: Survey and assessment. in Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09. pp. 45-52, 2009 Conference on Information Science, Technology and Applications, ISTA '09, Kuwait, Kuwait, 20/3/09. https://doi.org/10.1145/1551950.1551969
Al-Gharabally N, El-Sayed N, Al-Mulla S, Ahmad I. Wireless honeypots: Survey and assessment. In Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09. 2009. p. 45-52 https://doi.org/10.1145/1551950.1551969
Al-Gharabally, Noor ; El-Sayed, Nosayba ; Al-Mulla, Sara ; Ahmad, Imtiaz. / Wireless honeypots : Survey and assessment. Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09. 2009. pp. 45-52
@inproceedings{438f0983512145ad9ecfd2292b702820,
title = "Wireless honeypots: Survey and assessment",
abstract = "The great recent advancements in wireless networking have drawn attention to the privacy and security problems that accompanied them. Wireless Honeypots have been introduced as tools whose value lies in the unauthorized attempts to use them. They have been successfully deployed in areas where they were able to trap hackers into virtual networks, and collect useful information about their attempted attacks. In this paper, we discuss attacks against wireless networks and classify the different existing Wireless Honeypots methods that have been proposed for defense against these attacks. We assess each wireless honeypots method by comparing their strengths and weaknesses in terms of the methods of deception used with them, authentication protocols implemented, logging facilities, and several other attributes.",
keywords = "Deception, Honeypots, Survey, Wireless",
author = "Noor Al-Gharabally and Nosayba El-Sayed and Sara Al-Mulla and Imtiaz Ahmad",
year = "2009",
month = "12",
day = "1",
doi = "10.1145/1551950.1551969",
language = "English",
isbn = "9781605584782",
pages = "45--52",
booktitle = "Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09",

}

TY - GEN

T1 - Wireless honeypots

T2 - Survey and assessment

AU - Al-Gharabally, Noor

AU - El-Sayed, Nosayba

AU - Al-Mulla, Sara

AU - Ahmad, Imtiaz

PY - 2009/12/1

Y1 - 2009/12/1

N2 - The great recent advancements in wireless networking have drawn attention to the privacy and security problems that accompanied them. Wireless Honeypots have been introduced as tools whose value lies in the unauthorized attempts to use them. They have been successfully deployed in areas where they were able to trap hackers into virtual networks, and collect useful information about their attempted attacks. In this paper, we discuss attacks against wireless networks and classify the different existing Wireless Honeypots methods that have been proposed for defense against these attacks. We assess each wireless honeypots method by comparing their strengths and weaknesses in terms of the methods of deception used with them, authentication protocols implemented, logging facilities, and several other attributes.

AB - The great recent advancements in wireless networking have drawn attention to the privacy and security problems that accompanied them. Wireless Honeypots have been introduced as tools whose value lies in the unauthorized attempts to use them. They have been successfully deployed in areas where they were able to trap hackers into virtual networks, and collect useful information about their attempted attacks. In this paper, we discuss attacks against wireless networks and classify the different existing Wireless Honeypots methods that have been proposed for defense against these attacks. We assess each wireless honeypots method by comparing their strengths and weaknesses in terms of the methods of deception used with them, authentication protocols implemented, logging facilities, and several other attributes.

KW - Deception

KW - Honeypots

KW - Survey

KW - Wireless

UR - http://www.scopus.com/inward/record.url?scp=76749122922&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=76749122922&partnerID=8YFLogxK

U2 - 10.1145/1551950.1551969

DO - 10.1145/1551950.1551969

M3 - Conference contribution

AN - SCOPUS:76749122922

SN - 9781605584782

SP - 45

EP - 52

BT - Proceedings of the 2009 Conference on Information Science, Technology and Applications, ISTA '09

ER -