156 research outputs found

    Cyber-Attack Drone Payload Development and Geolocation via Directional Antennae

    Get PDF
    The increasing capabilities of commercial drones have led to blossoming drone usage in private sector industries ranging from agriculture to mining to cinema. Commercial drones have made amazing improvements in flight time, flight distance, and payload weight. These same features also offer a unique and unprecedented commodity for wireless hackers -- the ability to gain ‘physical’ proximity to a target without personally having to be anywhere near it. This capability is called Remote Physical Proximity (RPP). By their nature, wireless devices are largely susceptible to sniffing and injection attacks, but only if the attacker can interact with the device via physical proximity. A properly outfitted drone can increase the attack surface with RPP (adding a range of over 7 km using off-the-shelf drones), allowing full interactivity with wireless targets while the attacker can remain distant and hidden. Combined with the novel approach of using a directional antenna, these drones could also provide the means to collect targeted geolocation information of wireless devices from long distances passively, which is of significant value from an offensive cyberwarfare standpoint. This research develops skypie, a software and hardware framework designed for performing remote, directional drone-based collections. The prototype is inexpensive, lightweight, and totally independent of drone architecture, meaning it can be strapped to most medium to large commercial drones. The prototype effectively simulates the type of device that could be built by a motivated threat actor, and the development process evaluates strengths and shortcoming posed by these devices. This research also experimentally evaluates the ability of a drone-based attack system to track its targets by passively sniffing Wi-Fi signals from distances of 300 and 600 meters using a directional antenna. Additionally, it identifies collection techniques and processing algorithms for minimizing geolocation errors. Results show geolocation via 802.11 emissions (Wi-Fi) using a portable directional antenna is possible, but difficult to achieve the accuracy that GPS delivers (errors less than 5 m with 95% confidence). This research shows that geolocation predictions of a target cell phone acting as a Wi-Fi access point in a field from 300 m away is accurate within 70.1 m from 300 m away and within 76 meters from 600 m away. Three of the four main tests exceed the hypothesized geolocation error of 15% of the sensor-to-target distance, with tests 300 m away averaging 25.5% and tests 600 m away averaging at 34%. Improvements in bearing prediction are needed to reduce error to more tolerable quantities, and this thesis discusses several recommendations to do so. This research ultimately assists in developing operational drone-borne cyber-attack and reconnaissance capabilities, identifying limitations, and enlightening the public of countermeasures to mitigate the privacy threats posed by the inevitable rise of the cyber-attack drone

    Scanned Wireless Network Setup Fake Access Point & its Detection

    Get PDF
    This thesis addresses the topic of development and advancement of the wireless technology. Report described about network monitoring and security issues with advancement in the increase of network bandwidth and user requirements to access the internet. This report mainly focuses on how war driving affects the security of end user. How it can solve problem for infected users who are accessing the internet. The technique is used in wireless environment where all kinds of wireless devices can access internet and can use network resources with high security and better performance. Research on this topic reveals that passive monitoring technique can be used to scan the wireless network without even letting other devices to know that scanning is going on. In this way air traffic can easily be sniffed, which raises many security risks and threats related to sniffing the air traffic in wireless network that can easily reveal the personal identity of the end user who is using the wireless network. I have considered Man-in-the-middle scenario to implement FakeAP where the end user has to compromise its security in order to gain access to the network resources. I have also developed a solution to detect the FakeAP in the network which is misusing the network resources and wrote a program to trace down its location on Google maps

    Real-time multimedia-based education through the Internet

    Get PDF
    The rapid advances in computer and communications technologies are challenging the American education systems to provide increased educational opportunities beyond the traditional geographic boundaries at a reasonable cost. Many educational institutions are answering this challenge by developing distance education programs. Distance education provides effective learning environment. An important requirement for effective distance education is the availability of continuous interactivity and immediate feedback. Over the Internet, synchronous sharing of multimedia content introduces unacceptable delays as network bandwidth is limited. In this thesis, the issue of Internet bandwidth is minimized and a novel system is developed for distance education using multimedia course material over the Internet. The data rich multimedia materials reside at remote computers and are only remotely activated utilizing low bandwidth signals over the Internet. As a result, the large download times associated with multimedia files are eliminated creating an almost real time link between the remote locations

    A deception based framework for the application of deceptive countermeasures in 802.11b wireless networks

    Get PDF
    The advance of 802.11 b wireless networking has been beset by inherent and in-built security problems. Network security tools that are freely available may intercept network transmissions readily and stealthily, making organisations highly vulnerable to attack. Therefore, it is incumbent upon defending organisations to take initiative and implement proactive defences against common network attacks. Deception is an essential element of effective security that has been widely used in networks to understand attack methods and intrusions. However, little thought has been given to the type and the effectiveness of the deception. Deceptions deployed in nature, the military and in cyberspace were investigated to provide an understanding of how deception may be used in network security. Deceptive network countermeasures and attacks may then be tested on a wireless honeypot as an investigation into the effectiveness of deceptions used in network security. A structured framework, that describes the type of deception and its modus operandi, was utilised to deploy existing honeypot technologies for intrusion detection. Network countermeasures and attacks were mapped to deception types in the framework. This enabled the honeypot to appear as a realistic network and deceive targets in varying deceptive conditions. The investigation was to determine if particular deceptive countermeasures may reduce the effectiveness of particular attacks. The effectiveness of deceptions was measured, and determined by the honeypot\u27s ability to fool the attacking tools used. This was done using brute force network attacks on the wireless honeypot. The attack tools provided quantifiable forensic data from network sniffing, scans, and probes of the wireless honeypot. The aim was to deceive the attack tools into believing a wireless network existed, and contained vulnerabilities that may be further exploited by the naive attacker

    Inventory simulation and optimization using system dynamics, structural modeling equations and genetic algorithms in the drivetrain division of an automotive manufacturer

    Get PDF
    Strategic planning and control are among the most critical activities that modern enterprises require to succeed in the global economy. This research is an original study that investigated the combination of tools and methodologies in order to apply them to a midwestern tractor manufacturer. The current study identified the constraints applicable to a polishing line in the Drivetrain Division of a major tractor manufacturer interested in exploring alternative techniques to improve its worldwide manufacturing operations. The specific questions that this project tried to respond are stated as follows: What were the most important variables that affected inventory levels of an assembly line of an automotive manufacturer? What were the significant effects of the causal relationships identified in order to determine an initial model structure? What constrains restrict the behavior and improvement of the selected variables? What levels of the selected variables could be used in order to improve production levels? The current research explored the impact of a series of variables (work-in process, process utilization, cycle time, queue size, utilization of work centers, capacity, and others) in order to examine their impact in the overall performance of the polishing line. Two main models were developed based on two algorithms created for each of the selected part families (PTO and Covers), and in combination determined material flow, resource utilization, and sequencing within and outside the automatic polishing line. The two computer models combined both dynamic and discrete simulation to establish a reference to be used for improvement of similar processes within the company using structural equations modeling, path analysis, scatter plot diagrams, and eigen value plot. Besides, the results of this research indicated that: (a) cycle time can be improved with the addition of a new transporter in order to reduce the moving time within and between work centers; (b) the queue sizes of the polishing line were not improved significantly using either genetic algorithms (GA) and full factorial designs because of the low initial variability of the system; (c) the structural modeling equations model allowed to identify possible material flow errors based on its relationships, in this way it is possible to have a benchmark to compare both the results of the current study and the outcomes of similar studies developed by the company. In summary, a new methodology has been developed in order to study and optimize manufacturing systems, and avoid cost reductions without any statistical significance that might affect the strategic position of the company in the long run. The current study did not give a simple answer to the complexity of the discussed problem, but an alternative to many of the current academic and industrial solutions that can have more than one correct answer

    A WI-FI BASED SMART DATA LOGGER FOR CAPSULE ENDOSCOPY AND MEDICAL APPLICATIONS

    Get PDF
    Wireless capsule endoscopy (WCE) is a non-invasive technology for capturing images of a human digestive system for medical diagnostics purpose. With WCE, the patient swallows a miniature capsule with camera, data processing unit, RF transmitter and batteries. The capsule captures and transmits images wirelessly from inside the human gastrointestinal (GI) tract. The external data logger worn by the patient stores the images and is later on transferred to a computer for presentation and image analysis. In this research, we designed and built a Wi-Fi based, low cost, miniature, versatile wearable data logger. The data logger is used with Wi-Fi enabled smart devices, smart phones and data servers to store and present images captured by capsule. The proposed data logger is designed to work with wireless capsule endoscopy and other biosensors like- temperature and heart rate sensors. The data logger is small enough to carry and conduct daily activities, and the patient do not need to carry traditional bulky data recorder all the time during diagnosis. The doctors can remotely access data and analyze the images from capsule endoscopy using remote access feature of the data logger. Smartphones and tablets have extensive processing power with expandable memory. This research exploits those capabilities to use with wireless capsule endoscopy and medical data logging applications. The application- specific data recorders are replaced by the proposed Wi-Fi data logger and smartphone. The data processing application is distributed on smart devices like smartphone /tablets and data logger. Once data are stored in smart devices, the data can be accessed remotely, distributed to the cloud and shared within networks to enable telemedicine. The data logger can work in both standalone and network mode. In the normal mode of the device, data logger stores medical data locally into a micro Secure Digital card for future download using the universal serial bus to the computer. In network mode, the real-time data is streamed into a smartphone and tablet for further processing and storage. The proposed Wi-Fi based data logger is prototyped in the lab and tested with the capsule hardware developed in our laboratory. The supporting Android app is also developed to collect data from the data logger and present the processed data to the viewer. The PC based software is also developed to access the data recorder and capture and download data from the data logger in real-time remotely. Both in vivo and ex vivo trials using live pig have been conducted to validate the performance of the proposed device

    Simulation-Based Learning via Cisco Packet Tracer to Enhance the Teaching of Computer Networks

    Get PDF
    Teaching and learning computer networks is a crucial part of a computing undergraduates’ education. However, it is an abstract topic with theory that can be challenging for students to comprehend. Simulation-based learning can be used as a teaching tool to enhance networking-based lecture topics and help students more easily understand and visualise how it really works in a safe, user-friendly environment. One such simulation tool, Cisco Packet Tracer, can be used to good effect, and this paper reports on the practical implementation of the tool as identified in existing literature. Additionally, this paper discusses how Packet Tracer was utilised as part of a UK based first year undergraduate module ’Computers and Security’, and details the content of nine practical sessions, whilst also identifying the main benefits and challenges of their implementation from a practitioner’s perspective. It was found that while Packet Tracer can be an additional benefit to augment the teaching of networking concepts, there are limitations and challenges which educators must be aware of if implementing the tool. The paper therefore concludes with providing recommendations which should help educators and curriculum designers in creating and delivering more effective and interactive networking sessions

    Development of a Drone-Mounted Wireless Attack Platform

    Get PDF
    The commercial drone market has grown rapidly due to the increasing utility and capabilities of drones. This new found popularity has made it possible for inexpensive drones capable of impressive carry capacities and flight times to reach the consumer market. These new features also offer an invaluable resource to wireless hackers. Capitalizing on their mobility, a wireless hacker can equip a drone with hacking tools to surpass physical security (e.g. fences) with relative ease and reach wireless networks. This research seeks to experimentally evaluate the ability of a drone-mounted wireless attack platform equipped with a directional antenna to conduct wireless attacks effectively at distances greater than 800 meters. To test this hypothesis, the “skypie v2” prototype conducts computer network attacks against a target network and captured data is used to evaluate the effectiveness of the platform. Results showed that capture of a WPA2 handshake was possible at a RSSI of -72 dBm or 2400 meters from a network located in a open field. Additionally, nmap scans were conducted with a RSSI value of -74 dBm or nearly 3000 meters from the target network

    Survival in the e-conomy: 2nd Australian information warfare & security conference 2001

    Get PDF
    This is an international conference for academics and industry specialists in information warfare, security, and other related fields. The conference has drawn participants from national and international organisations

    Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

    Get PDF
    Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions
    corecore