THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies

Jonny Milliken, Alan Marshall

2010

Abstract

At present there is no common means for establishing the security performance of wireless local area networks (WLANs) against threats. Furthermore, there has been little investigation into whether security performance is reliant on network topography. Consequently this paper advocates that for a range of WLAN infrastructure topographies (home, enterprise & open-access) there can be significant diversity in terms of resources, equipment, users and most importantly security, which can in turn influence attack detection performance. In order to demonstrate these detection differences, a novel framework for evaluating network security performance (the Threat-Victim Table) is developed. This framework is applied to a range of WLAN topographies using an open source (Kismet) Wireless Intrusion Detection System. Three Kismet components are utilised; client, server and drone, to represent typical IDS deployment configurations for these topographies. Analysis of the security capability of Kismet is derived as an example of this framework, for qualifying network security performance against security threats and also to assess the priority level of these vulnerabilities.

Download


Paper Citation


in Harvard Style

Milliken J. and Marshall A. (2010). THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 37-42. DOI: 10.5220/0002935400370042

in Bibtex Style

@conference{secrypt10,
author={Jonny Milliken and Alan Marshall},
title={THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={37-42},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002935400370042},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - THE THREAT-VICTIM TABLE - A Security Prioritisation Framework For Diverse WLAN Network Topographies
SN - 978-989-8425-18-8
AU - Milliken J.
AU - Marshall A.
PY - 2010
SP - 37
EP - 42
DO - 10.5220/0002935400370042