Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics

作者: Benjamin Turnbull , Jill Slay

DOI: 10.1109/ARES.2008.135

关键词:

摘要: 802.11-based wireless networking has significantly altered the means and topology for cities, offices, homes coffee shops over last five years. A second generation of devices extended what was once a computer-to-computer protocol into area embedded functional devices. Accompanying this widespread usage is presence crime; more popular technology, opportunity exists its misuse. This work studies environment from forensic computing perspective. It seeks to understand current state misuse: present misuses; potential forms misuse involving networks; tools techniques used in identification, containment analysis. The research highlights lack procedures investigations that are able effectively handle networks, there may escape detection by investigation teams.

参考文章(11)
Konstantin V. Gravrilenko, Andrei A. Mikhailovskiy, Andrew Vladimirov, Wi-Foo: The Secrets of Wireless Hacking ,(2004)
Neeti Gupta, Grande Wi-Fi : understanding what Wi-Fi users are doing in coffee-shops Massachusetts Institute of Technology. ,(2004)
Richard Bejtlich, Curtis W. Rose, Keith J. Jones, Real Digital Forensics: Computer Security and Incident Response ,(2005)
Jill Slay, Benjamin Turnbull, The 802.11 Technology Gap - Case Studies in Crime ieee region 10 conference. pp. 1- 7 ,(2005) , 10.1109/TENCON.2005.300890
Terry Schmidt, Anthony Townsend, Why Wi-Fi wants to be free Communications of The ACM. ,vol. 46, pp. 47- 52 ,(2003) , 10.1145/769800.769825
Michael W. Ritter, The Future of WLAN Queue. ,vol. 1, pp. 18- 27 ,(2003) , 10.1145/846057.846059
W.A. Arbaugh, Wireless security is different IEEE Computer. ,vol. 36, pp. 99- 101 ,(2003) , 10.1109/MC.2003.1220591
Anand Balachandran, Geoffrey M. Voelker, Paramvir Bahl, Wireless hotspots: current challenges and future directions Mobile Networks and Applications. ,vol. 10, pp. 265- 274 ,(2005) , 10.1007/S11036-005-6421-5
Magdalena Balazinska, Paul Castro, Characterizing mobility and network usage in a corporate wireless local-area network Proceedings of the 1st international conference on Mobile systems, applications and services - MobiSys '03. pp. 303- 316 ,(2003) , 10.1145/1066116.1066127
Andrei A. Mikhailovsky, Andrew Vladimirov, Konstantin V. Gavrilenko, Wi-Foo II: The Secrets of Wireless Hacking (2nd Edition) Addison-Wesley Professional. ,(2007)