Non-invasive node detection in IEEE 802.11 wireless networks
IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Zanetti, Guido Piero Palazzi, Claudio Enrico |
description | IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities. |
doi_str_mv | 10.1109/WD.2010.5657729 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5657729</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5657729</ieee_id><sourcerecordid>5657729</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1319-268868bab48adb68a006cab96787c35131413cd8bbf3a23e713ec100b3423a1f3</originalsourceid><addsrcrecordid>eNo9UE1LAzEUjF9grT178JI_sDXvJZsP8CJ11ULRi6K3kuy-hWjNymZp8d-7YOlchmGGYRjGrkDMAYS7eb-foxhFqUtj0B2xC1ColEO07phNEEpdOIMfJwdDCnF6MADO2SznTzGiRGOMmrDb5y4VMW19jlviqWuINzRQPcQu8Zj4sqoqbgWOA_gu9rShnHmiYdf1X_mSnbV-k2m25yl7e6heF0_F6uVxubhbFREkuAK1tdoGH5T1TdDWC6FrH5w21tSyHDMKZN3YEFrpUZIBSTUIEaRC6aGVU3b93xuJaP3Tx2_f_673L8g_NxtJaQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</creator><creatorcontrib>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</creatorcontrib><description>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</description><identifier>ISSN: 2156-9711</identifier><identifier>ISBN: 1424492300</identifier><identifier>ISBN: 9781424492305</identifier><identifier>EISSN: 2156-972X</identifier><identifier>EISBN: 1424492289</identifier><identifier>EISBN: 1424492297</identifier><identifier>EISBN: 9781424492299</identifier><identifier>EISBN: 9781424492282</identifier><identifier>DOI: 10.1109/WD.2010.5657729</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; IEEE 802.11 ; IEEE 802.11 Standards ; mac80211 ; Monitoring ; Promiscuous mode ; Protocols ; RFMON ; sniffer ; Wireless LAN ; Wireless networks</subject><ispartof>2010 IFIP Wireless Days, 2010, p.1-5</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5657729$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5657729$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zanetti, Guido Piero</creatorcontrib><creatorcontrib>Palazzi, Claudio Enrico</creatorcontrib><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><title>2010 IFIP Wireless Days</title><addtitle>WD</addtitle><description>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</description><subject>Ad hoc networks</subject><subject>IEEE 802.11</subject><subject>IEEE 802.11 Standards</subject><subject>mac80211</subject><subject>Monitoring</subject><subject>Promiscuous mode</subject><subject>Protocols</subject><subject>RFMON</subject><subject>sniffer</subject><subject>Wireless LAN</subject><subject>Wireless networks</subject><issn>2156-9711</issn><issn>2156-972X</issn><isbn>1424492300</isbn><isbn>9781424492305</isbn><isbn>1424492289</isbn><isbn>1424492297</isbn><isbn>9781424492299</isbn><isbn>9781424492282</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UE1LAzEUjF9grT178JI_sDXvJZsP8CJ11ULRi6K3kuy-hWjNymZp8d-7YOlchmGGYRjGrkDMAYS7eb-foxhFqUtj0B2xC1ColEO07phNEEpdOIMfJwdDCnF6MADO2SznTzGiRGOMmrDb5y4VMW19jlviqWuINzRQPcQu8Zj4sqoqbgWOA_gu9rShnHmiYdf1X_mSnbV-k2m25yl7e6heF0_F6uVxubhbFREkuAK1tdoGH5T1TdDWC6FrH5w21tSyHDMKZN3YEFrpUZIBSTUIEaRC6aGVU3b93xuJaP3Tx2_f_673L8g_NxtJaQ</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Zanetti, Guido Piero</creator><creator>Palazzi, Claudio Enrico</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201010</creationdate><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><author>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1319-268868bab48adb68a006cab96787c35131413cd8bbf3a23e713ec100b3423a1f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad hoc networks</topic><topic>IEEE 802.11</topic><topic>IEEE 802.11 Standards</topic><topic>mac80211</topic><topic>Monitoring</topic><topic>Promiscuous mode</topic><topic>Protocols</topic><topic>RFMON</topic><topic>sniffer</topic><topic>Wireless LAN</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Zanetti, Guido Piero</creatorcontrib><creatorcontrib>Palazzi, Claudio Enrico</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zanetti, Guido Piero</au><au>Palazzi, Claudio Enrico</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Non-invasive node detection in IEEE 802.11 wireless networks</atitle><btitle>2010 IFIP Wireless Days</btitle><stitle>WD</stitle><date>2010-10</date><risdate>2010</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><issn>2156-9711</issn><eissn>2156-972X</eissn><isbn>1424492300</isbn><isbn>9781424492305</isbn><eisbn>1424492289</eisbn><eisbn>1424492297</eisbn><eisbn>9781424492299</eisbn><eisbn>9781424492282</eisbn><abstract>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</abstract><pub>IEEE</pub><doi>10.1109/WD.2010.5657729</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2156-9711 |
ispartof | 2010 IFIP Wireless Days, 2010, p.1-5 |
issn | 2156-9711 2156-972X |
language | eng |
recordid | cdi_ieee_primary_5657729 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks IEEE 802.11 IEEE 802.11 Standards mac80211 Monitoring Promiscuous mode Protocols RFMON sniffer Wireless LAN Wireless networks |
title | Non-invasive node detection in IEEE 802.11 wireless networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T18%3A29%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Non-invasive%20node%20detection%20in%20IEEE%20802.11%20wireless%20networks&rft.btitle=2010%20IFIP%20Wireless%20Days&rft.au=Zanetti,%20Guido%20Piero&rft.date=2010-10&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.issn=2156-9711&rft.eissn=2156-972X&rft.isbn=1424492300&rft.isbn_list=9781424492305&rft_id=info:doi/10.1109/WD.2010.5657729&rft_dat=%3Cieee_6IE%3E5657729%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424492289&rft.eisbn_list=1424492297&rft.eisbn_list=9781424492299&rft.eisbn_list=9781424492282&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5657729&rfr_iscdi=true |