Detection of vulnerability attack through wireless network on android platform
This research is to identify the vulnerability attack that focus on the ARP spoofing attack in the Android platform. This is because each of attacks likes Man-In-The-Middle, Session Hijacking and Password Sniffing are occurring cause of ARP spoofing attack. After that, this research continues with...
| Main Author: | Muhamad Izhan Fakri, Imran |
|---|---|
| Format: | Undergraduates Project Papers |
| Language: | English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/1/Detection%20of%20vulnerability%20attack%20through%20wireless%20network%20on%20android%20platform.pdf |
Similar Items
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
by: Romli, Rahiwan Nazar, et al.
Published: (2018)
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
by: Apandi, Mohamad Aiman Hanif
Published: (2019)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Taxonomy of attacks on wireless sensor networks
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Live video streaming for mobile devices: an application on android platform
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
Energy trust system for detecting sybil attack in clustered wireless sensor networks
by: Alsaedi, Noor, et al.
Published: (2015)
by: Alsaedi, Noor, et al.
Published: (2015)
Energy trust system for detecting sybil attacks in clustered wireless sensor network
by: Hussein, Noor Sabeeh
Published: (2016)
by: Hussein, Noor Sabeeh
Published: (2016)
Enhanced Face Recognition Method Performance on Android vs Windows Platform
by: Alsibai, Mohammad Hayyan, et al.
Published: (2015)
by: Alsibai, Mohammad Hayyan, et al.
Published: (2015)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Application of Artificial Neural Network in Detection of DOS Attacks
by: Ahmad, iftikhar, et al.
Published: (2009)
by: Ahmad, iftikhar, et al.
Published: (2009)
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
Gps solution for active queue management using android platform
by: Liu, Yu Yao
Published: (2021)
by: Liu, Yu Yao
Published: (2021)
Danger theory based node replication attacks detection in mobile wireless sensor network
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
A new sinkhole attack detection algorithm for RPL in wireless sensor networks (WSN)
by: Ali, Mohammed Qasim
Published: (2019)
by: Ali, Mohammed Qasim
Published: (2019)
Integrating ZigBee modem into android platform
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
by: Abd Rahman, Akmal Nurhananie, et al.
Published: (2014)
Hybrid multi-level detection and mitigation of clone attacks in mobile wireless sensor network (MWSN)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2020)
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
by: Alsaedi, Noor, et al.
Published: (2017)
by: Alsaedi, Noor, et al.
Published: (2017)
Vehicle keyless entry system vulnerable to 'relay attacks'
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
by: Mohd Rashidi, Qirana Nabilla
Published: (2024)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Design and implementation of automatic number plate recognition on android platform
by: Mutholib, Abdul, et al.
Published: (2012)
by: Mutholib, Abdul, et al.
Published: (2012)
Proximity detection with Bluetooth and GPS using android smartphones
by: Lim, Yuen Nee
Published: (2012)
by: Lim, Yuen Nee
Published: (2012)
Voice-based data entry through Android phone
by: Fan, Chee Khuen
Published: (2014)
by: Fan, Chee Khuen
Published: (2014)
My mobile class assistant application on android platform
by: Nurul Wahidah, Zainal Al Abidin
Published: (2013)
by: Nurul Wahidah, Zainal Al Abidin
Published: (2013)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Secure-Rpl: Approach To Prevent Resource-Based Attacks In Wireless Sensor Networks Using Balanced Clustering
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
by: Alhamead Al Absi, Basim Ahmad Abed
Published: (2020)
Real-Time Video Processing Using Native
Programming on Android Platform
by: Saipullah, Khairul Muzzammil
Published: (2012)
by: Saipullah, Khairul Muzzammil
Published: (2012)
Icalendar for Android
by: Chong, Ka Ying
Published: (2013)
by: Chong, Ka Ying
Published: (2013)
Node replication attacks in mobile wireless sensor network: a survey
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
by: Shaukat, Haafizah Rameeza, et al.
Published: (2014)
Wireless local area network: a comprehensive review of attacks and metrics
by: Sarvari, Samira, et al.
Published: (2017)
by: Sarvari, Samira, et al.
Published: (2017)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
by: Mohammed Aswad, Firas, et al.
Published: (2023)
by: Mohammed Aswad, Firas, et al.
Published: (2023)
Design of automatic number plate recognition on android smartphone platform
by: Gunawan, Teddy Surya, et al.
Published: (2017)
by: Gunawan, Teddy Surya, et al.
Published: (2017)
Aplikasi EDM die sinking dengan menggunakan platform android
by: Ismail, Mohd Erfy, et al.
Published: (2017)
by: Ismail, Mohd Erfy, et al.
Published: (2017)
A framework for indoor positioning system based on android platform
by: Law, Yeong Hui
Published: (2013)
by: Law, Yeong Hui
Published: (2013)
Early detection and mitigation of DDoS attacks in software defined networks
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
by: Al-Saadi, Mustafa Yahya Zakariya
Published: (2018)
Similar Items
-
Understanding the root of attack in android malware
by: Romli, Rahiwan Nazar, et al.
Published: (2018) -
Attacks, vulnerabilities and security requirements in smart metering networks
by: Abdullah, Muhammad Daniel Hafiz, et al.
Published: (2015) -
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013) -
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018) -
Performance analysis on detection and prevention of wormhole attack in wireless network
by: Apandi, Mohamad Aiman Hanif
Published: (2019)