Non-invasive node detection in IEEE 802.11 wireless networks

IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Zanetti, Guido Piero, Palazzi, Claudio Enrico
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 5
container_issue
container_start_page 1
container_title
container_volume
creator Zanetti, Guido Piero
Palazzi, Claudio Enrico
description IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.
doi_str_mv 10.1109/WD.2010.5657729
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5657729</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5657729</ieee_id><sourcerecordid>5657729</sourcerecordid><originalsourceid>FETCH-LOGICAL-i1319-268868bab48adb68a006cab96787c35131413cd8bbf3a23e713ec100b3423a1f3</originalsourceid><addsrcrecordid>eNo9UE1LAzEUjF9grT178JI_sDXvJZsP8CJ11ULRi6K3kuy-hWjNymZp8d-7YOlchmGGYRjGrkDMAYS7eb-foxhFqUtj0B2xC1ColEO07phNEEpdOIMfJwdDCnF6MADO2SznTzGiRGOMmrDb5y4VMW19jlviqWuINzRQPcQu8Zj4sqoqbgWOA_gu9rShnHmiYdf1X_mSnbV-k2m25yl7e6heF0_F6uVxubhbFREkuAK1tdoGH5T1TdDWC6FrH5w21tSyHDMKZN3YEFrpUZIBSTUIEaRC6aGVU3b93xuJaP3Tx2_f_673L8g_NxtJaQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</creator><creatorcontrib>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</creatorcontrib><description>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</description><identifier>ISSN: 2156-9711</identifier><identifier>ISBN: 1424492300</identifier><identifier>ISBN: 9781424492305</identifier><identifier>EISSN: 2156-972X</identifier><identifier>EISBN: 1424492289</identifier><identifier>EISBN: 1424492297</identifier><identifier>EISBN: 9781424492299</identifier><identifier>EISBN: 9781424492282</identifier><identifier>DOI: 10.1109/WD.2010.5657729</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; IEEE 802.11 ; IEEE 802.11 Standards ; mac80211 ; Monitoring ; Promiscuous mode ; Protocols ; RFMON ; sniffer ; Wireless LAN ; Wireless networks</subject><ispartof>2010 IFIP Wireless Days, 2010, p.1-5</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5657729$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5657729$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Zanetti, Guido Piero</creatorcontrib><creatorcontrib>Palazzi, Claudio Enrico</creatorcontrib><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><title>2010 IFIP Wireless Days</title><addtitle>WD</addtitle><description>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</description><subject>Ad hoc networks</subject><subject>IEEE 802.11</subject><subject>IEEE 802.11 Standards</subject><subject>mac80211</subject><subject>Monitoring</subject><subject>Promiscuous mode</subject><subject>Protocols</subject><subject>RFMON</subject><subject>sniffer</subject><subject>Wireless LAN</subject><subject>Wireless networks</subject><issn>2156-9711</issn><issn>2156-972X</issn><isbn>1424492300</isbn><isbn>9781424492305</isbn><isbn>1424492289</isbn><isbn>1424492297</isbn><isbn>9781424492299</isbn><isbn>9781424492282</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9UE1LAzEUjF9grT178JI_sDXvJZsP8CJ11ULRi6K3kuy-hWjNymZp8d-7YOlchmGGYRjGrkDMAYS7eb-foxhFqUtj0B2xC1ColEO07phNEEpdOIMfJwdDCnF6MADO2SznTzGiRGOMmrDb5y4VMW19jlviqWuINzRQPcQu8Zj4sqoqbgWOA_gu9rShnHmiYdf1X_mSnbV-k2m25yl7e6heF0_F6uVxubhbFREkuAK1tdoGH5T1TdDWC6FrH5w21tSyHDMKZN3YEFrpUZIBSTUIEaRC6aGVU3b93xuJaP3Tx2_f_673L8g_NxtJaQ</recordid><startdate>201010</startdate><enddate>201010</enddate><creator>Zanetti, Guido Piero</creator><creator>Palazzi, Claudio Enrico</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201010</creationdate><title>Non-invasive node detection in IEEE 802.11 wireless networks</title><author>Zanetti, Guido Piero ; Palazzi, Claudio Enrico</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i1319-268868bab48adb68a006cab96787c35131413cd8bbf3a23e713ec100b3423a1f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Ad hoc networks</topic><topic>IEEE 802.11</topic><topic>IEEE 802.11 Standards</topic><topic>mac80211</topic><topic>Monitoring</topic><topic>Promiscuous mode</topic><topic>Protocols</topic><topic>RFMON</topic><topic>sniffer</topic><topic>Wireless LAN</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Zanetti, Guido Piero</creatorcontrib><creatorcontrib>Palazzi, Claudio Enrico</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Zanetti, Guido Piero</au><au>Palazzi, Claudio Enrico</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Non-invasive node detection in IEEE 802.11 wireless networks</atitle><btitle>2010 IFIP Wireless Days</btitle><stitle>WD</stitle><date>2010-10</date><risdate>2010</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><issn>2156-9711</issn><eissn>2156-972X</eissn><isbn>1424492300</isbn><isbn>9781424492305</isbn><eisbn>1424492289</eisbn><eisbn>1424492297</eisbn><eisbn>9781424492299</eisbn><eisbn>9781424492282</eisbn><abstract>IEEE 802.11 wireless sniffers are useful tools for monitoring network traffic and for the acquisition of information at the MAC level and above. The standard approach for implementing a wireless sniffer is to setup a device in the so-called Promiscuous mode. In this mode, devices are able to acquire all traffic that passes through them, independently from its destination. On a wireless network, this means that it is possible to monitor all the activities inside the device's cover range. Unfortunately, the Promiscuous mode limits the use of the device by prohibiting the association with wireless networks, or in general, sending data. This limitation restricts uses of sniffers on specific scenarios. This paper shows how to remove such limitation by presenting our Laurin Project. Laurin is a wireless sniffer that provides sniffer's capabilities without limiting the device's use. This solution opens the doors to the development of new desktop-oriented applications that take advantage of network monitoring capabilities.</abstract><pub>IEEE</pub><doi>10.1109/WD.2010.5657729</doi><tpages>5</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2156-9711
ispartof 2010 IFIP Wireless Days, 2010, p.1-5
issn 2156-9711
2156-972X
language eng
recordid cdi_ieee_primary_5657729
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
IEEE 802.11
IEEE 802.11 Standards
mac80211
Monitoring
Promiscuous mode
Protocols
RFMON
sniffer
Wireless LAN
Wireless networks
title Non-invasive node detection in IEEE 802.11 wireless networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-30T18%3A29%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Non-invasive%20node%20detection%20in%20IEEE%20802.11%20wireless%20networks&rft.btitle=2010%20IFIP%20Wireless%20Days&rft.au=Zanetti,%20Guido%20Piero&rft.date=2010-10&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.issn=2156-9711&rft.eissn=2156-972X&rft.isbn=1424492300&rft.isbn_list=9781424492305&rft_id=info:doi/10.1109/WD.2010.5657729&rft_dat=%3Cieee_6IE%3E5657729%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424492289&rft.eisbn_list=1424492297&rft.eisbn_list=9781424492299&rft.eisbn_list=9781424492282&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5657729&rfr_iscdi=true