Detection of vulnerability attack through wireless network on android platform
This research is to identify the vulnerability attack that focus on the ARP spoofing attack in the Android platform. This is because each of attacks likes Man-In-The-Middle, Session Hijacking and Password Sniffing are occurring cause of ARP spoofing attack. After that, this research continues with...
| Main Author: | Muhamad Izhan Fakri, Imran |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/1/Detection%20of%20vulnerability%20attack%20through%20wireless%20network%20on%20android%20platform.pdf |
Similar Items
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Live video streaming for mobile devices: an application on android platform
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Enhanced Face Recognition Method Performance on Android vs Windows Platform
by: Alsibai, Mohammad Hayyan, et al.
Published: (2015)
by: Alsibai, Mohammad Hayyan, et al.
Published: (2015)
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
Danger theory based node replication attacks detection in mobile wireless sensor network
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Gps solution for active queue management using android platform
by: Liu, Yu Yao
Published: (2021)
by: Liu, Yu Yao
Published: (2021)
A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)
by: Ali, Mohammed Qasim
Published: (2019)
by: Ali, Mohammed Qasim
Published: (2019)
Integrating ZigBee modem into android platform
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Vehicle keyless entry system vulnerable to 'relay attacks'
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Design and implementation of automatic number plate recognition on android platform
by: Mutholib, Abdul, et al.
Published: (2012)
by: Mutholib, Abdul, et al.
Published: (2012)
Proximity detection with Bluetooth and GPS using android smartphones
by: Lim, Yuen Nee
Published: (2012)
by: Lim, Yuen Nee
Published: (2012)
Voice-based data entry through Android phone
by: Fan, Chee Khuen
Published: (2014)
by: Fan, Chee Khuen
Published: (2014)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
My mobile class assistant application on android platform
by: Nurul Wahidah, Zainal Al Abidin
Published: (2013)
by: Nurul Wahidah, Zainal Al Abidin
Published: (2013)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Real-Time Video Processing Using Native
Programming on Android Platform
by: Saipullah, Khairul Muzzammil
Published: (2012)
by: Saipullah, Khairul Muzzammil
Published: (2012)
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Wireless local area network: a comprehensive review of attacks and metrics
by: Sarvari, Samira, et al.
Published: (2017)
by: Sarvari, Samira, et al.
Published: (2017)
Icalendar for Android
by: Chong, Ka Ying
Published: (2013)
by: Chong, Ka Ying
Published: (2013)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Design of automatic number plate recognition on android smartphone platform
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
Aplikasi EDM die sinking dengan menggunakan platform android
by: Ismail, Mohd Erfy, et al.
Published: (2017)
by: Ismail, Mohd Erfy, et al.
Published: (2017)
A framework for indoor positioning system based on android platform
by: Law, Yeong Hui
Published: (2013)
by: Law, Yeong Hui
Published: (2013)
Similar Items
-
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018) -
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019) -
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)