Authors: J. Jenny Li; Jing-Chiou Liou
Addresses: Department of Computer Science, Kean University, 1000 Morris Ave, Union, NJ 07083, USA ' Department of Computer Science, Kean University, 1000 Morris Ave, Union, NJ 07083, USA
Abstract: Most security research focuses on protection from security threats. In this paper, we surveyed potential attacks to wireless networks, especially the usage of virtual machine infrastructure to carry out hit-and-run type of attacks. In the study of attacks, we demonstrate how to use a virtual machine to gain access and control to wireless routers while hiding attacker identities. We illustrate such attacks on our own private wireless network, as well as neighbourhood networks with granted permissions. Besides identifying the vulnerabilities of wireless routers, we studied the damages that can be done through such attacks and propose some solutions to detect and protect against this kind of hit-and-run attacks.
Keywords: router; wireless security; virtual machine.
International Journal of Information Privacy, Security and Integrity, 2017 Vol.3 No.1, pp.58 - 74
Available online: 15 Sep 2017 *Full-text access for editors Access for subscribers Free access Comment on this article