Detecting, locating, and tracking hacker activities within a WLAN network

Kevin C. Shum, Joseph K Y NG

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

2 Citations (Scopus)

Abstract

With a good location estimation integrated into a Wi-Fi surveillance system, system administrator can closely monitor the network traffic as well as the behavior of the mobile users. Hence, there is a growing demand to have a quick and efficient way to indentify a specific group of people, or devices or asset within a controlled wireless network. In our proposed system, all the Wi-Fi traffic and information especially the MAC addresses and RSSI from the mobile clients (i.e. Wi-Fi devices) can be sniffed by an open-source Wi-Fi access point (AP) with custom-made embedded software program and without preloading any client program on the mobile user devices. These sniffed information is then analyzed and stored in a database which will help network administrator to monitor the wireless network for surveillance purpose and security concerns. In summary, this paper proposes a wireless LAN system that can detect, locate and track down wireless communication within the system by modifying the embedded software in off-the-shelf WLAN APs. Experiment results have shown that abnormal wireless activities can be detected and by our signal strength based localization algorithm, positions of these wireless mobile devices can be identified and be tracked within meters inside our WLAN system.

Original languageEnglish
Title of host publicationProceedings - 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2010
Pages53-58
Number of pages6
DOIs
Publication statusPublished - 2010
Event16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2010 - Macau, China
Duration: 23 Aug 201025 Aug 2010

Publication series

NameProceedings - 16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2010

Conference

Conference16th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2010
Country/TerritoryChina
CityMacau
Period23/08/1025/08/10

Scopus Subject Areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Detecting, locating, and tracking hacker activities within a WLAN network'. Together they form a unique fingerprint.

Cite this