Tezislər / Theses



Yüklə 17,55 Mb.
Pdf görüntüsü
səhifə207/493
tarix02.10.2023
ölçüsü17,55 Mb.
#151572
1   ...   203   204   205   206   207   208   209   210   ...   493
BHOS Tezisler 2022 17x24sm

Monitor:
monitor mode is indicated by this word. 
The radio can only broadcast WLAN services that have been scanned 
by the air interface in this mode; it cannot send common WLAN services. 
Some APs support the following features when in monitor mode: 

dual-band-scan: inter-band scanning is indicated by this term. The 
radio may scan in both the 2.4 GHz and 5 GHz bands while in this mode. 

proxy-scan: indicates that the proxy is being scanned. The radio is 
committed to all air interface scanning functions on behalf of service radios 
in this mode, ensuring that service radio services are unaffected. 
Wireless device identification and rogue device identification are the two 
phases of intrusion detection. 

Three sorts of unauthorised devices can be prohibited through an AC: 

Rogue or interference AP 

Unauthorized or interference STA 

Ad-hoc device 

Attack detection can be set on small and medium-scale WLANs to 
permit an AP to include attackers to a dynamic ban list and send warnings to 
the AC to notify administrators. When attack detection is enabled, it can 
detect the aforementioned: 


THE 3
rd
 INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS 
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
215

Flooding attacks 

Weak initialization vector (IV) attacks 

Spoofing attacks 

During a brute force hack, the attacker attempts all possible password 
combinations in quest of a password. The exhaustive attack method is 
another name for this method. A four-digit password with only numbers, for 
example, may have a maximum of 10,000 possible possibilities. As a result, 
after a maximum of 10,000 attempts, the password can be decrypted. The 
brute force method can theoretically decrypt any password. Attackers, on the 
other hand, are always looking for ways to reduce the amount of time it takes 
to decrypt the password. When a WLAN's security policy is WPA/WPA2-
PSK, WAPI-PSK, or WEP-Shared-Key, attackers can decrypt the password 
using the brute force approach. By extending the time it takes to decode 
passwords, using a key helps protect WLANs from brute force assaults. 
During WPA/WPA2-PSK, WAPI-PSK, or WEP-Shared-Key authentication
an AP examines whether the number of key negotiation attempts exceeds 
the configured threshold. If the threshold is surpassed, the AP suspects the 
user is attempting to decode the password using the brute force approach 
and sends an alarm to the AC. The AP adds the user to the dynamic ban list 
and discards all of the user's packets until the dynamic ban list entry expires 
if the dynamic ban list function is enabled. 

Yüklə 17,55 Mb.

Dostları ilə paylaş:
1   ...   203   204   205   206   207   208   209   210   ...   493




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin