Detection of vulnerability attack through wireless network on android platform
This research is to identify the vulnerability attack that focus on the ARP spoofing attack in the Android platform. This is because each of attacks likes Man-In-The-Middle, Session Hijacking and Password Sniffing are occurring cause of ARP spoofing attack. After that, this research continues with...
Main Author: | |
---|---|
Format: | Undergraduates Project Papers |
Language: | English |
Published: |
2014
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/1/FSKKP%20-%20MUHAMAD%20IZHAN%20FAKRI%20IMRAN.PDF |
id |
ump-13366 |
---|---|
recordtype |
eprints |
spelling |
ump-133662016-06-16T04:20:08Z http://umpir.ump.edu.my/id/eprint/13366/ Detection of vulnerability attack through wireless network on android platform Muhamad Izhan Fakri, Imran T Technology (General) This research is to identify the vulnerability attack that focus on the ARP spoofing attack in the Android platform. This is because each of attacks likes Man-In-The-Middle, Session Hijacking and Password Sniffing are occurring cause of ARP spoofing attack. After that, this research continues with studying about the active technique: ARP request and TCPSYN injection of packet that intend for detecting the ARP spoofing attack. This technique is better than the passive technique that also used for detection of the ARP spoofing. The passive technique is not effective to use because it takes time too long to detect and report the attack. Additionally, if the MAC addresses flooding into the ARP cache on switch with ARP requests and replies may lead to new report tables every time which makes it is unreliable. Next, at the end of this research will develop an Android application for applying the active technique as a method to detect and prevent the ARP spoofing attack on Android smartphone. The Android application will be developed by using Java programming language. The main aim here is that Android application can avoid the attacker steal the Android user's information by launching some attacks that started with the ARP spoofing attack. 2014 Undergraduates Project Papers NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/13366/1/FSKKP%20-%20MUHAMAD%20IZHAN%20FAKRI%20IMRAN.PDF Muhamad Izhan Fakri, Imran (2014) Detection of vulnerability attack through wireless network on android platform. Faculty of Computer Systems and Software Engineering, Universiti Malaysia Pahang. http://iportal.ump.edu.my/lib/item?id=chamo:92010&theme=UMP2 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Muhamad Izhan Fakri, Imran Detection of vulnerability attack through wireless network on android platform |
description |
This research is to identify the vulnerability attack that focus on the ARP spoofing attack in the Android platform. This is because each of attacks likes Man-In-The-Middle, Session Hijacking and Password Sniffing are occurring cause of ARP spoofing attack. After that,
this research continues with studying about the active technique: ARP request and TCPSYN injection of packet that intend for detecting the ARP spoofing attack. This technique is better than the passive technique that also used for detection of the ARP spoofing. The passive technique is not effective to use because it takes time too long to detect and report the attack. Additionally, if the MAC addresses flooding into the ARP cache on switch with ARP requests and replies may lead to new report tables every time which makes it is unreliable. Next, at the end of this research will develop an Android application for applying the active technique as a method to detect and prevent the ARP spoofing attack on Android smartphone. The Android application will be developed by using Java programming language. The main aim here is that Android application can avoid the attacker steal the Android user's information by launching some attacks that started with the ARP spoofing attack. |
format |
Undergraduates Project Papers |
author |
Muhamad Izhan Fakri, Imran |
author_facet |
Muhamad Izhan Fakri, Imran |
author_sort |
Muhamad Izhan Fakri, Imran |
title |
Detection of vulnerability attack through wireless network on android platform |
title_short |
Detection of vulnerability attack through wireless network on android platform |
title_full |
Detection of vulnerability attack through wireless network on android platform |
title_fullStr |
Detection of vulnerability attack through wireless network on android platform |
title_full_unstemmed |
Detection of vulnerability attack through wireless network on android platform |
title_sort |
detection of vulnerability attack through wireless network on android platform |
publishDate |
2014 |
url |
http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/ http://umpir.ump.edu.my/id/eprint/13366/1/FSKKP%20-%20MUHAMAD%20IZHAN%20FAKRI%20IMRAN.PDF |
first_indexed |
2023-09-18T22:15:55Z |
last_indexed |
2023-09-18T22:15:55Z |
_version_ |
1777415336246640640 |