Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools

1 recurso en línea (páginas 73-80).

Autores:
Tipo de recurso:
article
Fecha de publicación:
2018
Institución:
Universidad Pedagógica y Tecnológica de Colombia
Repositorio:
RiUPTC: Repositorio Institucional UPTC
Idioma:
eng
OAI Identifier:
oai:repositorio.uptc.edu.co:001/2163
Acceso en línea:
http://repositorio.uptc.edu.co/handle/001/2163
Palabra clave:
Information security
Data transmission systems
Data security
Intrusion detection
Wireless security
Rights
openAccess
License
Copyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombia
id REPOUPTC_95ddc8c9055d4f10cbefddb429e5ec4c
oai_identifier_str oai:repositorio.uptc.edu.co:001/2163
network_acronym_str REPOUPTC
network_name_str RiUPTC: Repositorio Institucional UPTC
repository_id_str
dc.title.none.fl_str_mv Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Evaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ng
Avaliação de segurança em protocolo de rede sem fio WPA2-PSK usando as ferramentas Linset e Aircrack-ng
title Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
spellingShingle Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
Acosta López, Alberto
Information security
Data transmission systems
Data security
Intrusion detection
Wireless security
title_short Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_full Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_fullStr Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_full_unstemmed Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
title_sort Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
dc.creator.none.fl_str_mv Acosta López, Alberto
Melo Monroy, Elver Yesid
Linares Murcia, Pablo Andrés
author Acosta López, Alberto
author_facet Acosta López, Alberto
Melo Monroy, Elver Yesid
Linares Murcia, Pablo Andrés
author_role author
author2 Melo Monroy, Elver Yesid
Linares Murcia, Pablo Andrés
author2_role author
author
dc.subject.none.fl_str_mv Information security
Data transmission systems
Data security
Intrusion detection
Wireless security
topic Information security
Data transmission systems
Data security
Intrusion detection
Wireless security
description 1 recurso en línea (páginas 73-80).
publishDate 2018
dc.date.none.fl_str_mv 2018-09-07T20:30:39Z
2018-09-07T20:30:39Z
2018-01-15
dc.type.none.fl_str_mv Artículo de revista
http://purl.org/coar/resource_type/c_6501
info:eu-repo/semantics/article
info:eu-repo/semantics/publishedVersion
Text
https://purl.org/redcol/resource_type/ART
http://purl.org/coar/version/c_970fb48d4fbd8a85
format article
status_str publishedVersion
dc.identifier.none.fl_str_mv Acosta López, A., Melo Monroy, E. Y. & Linares Murcia, P. A. (2018). Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools. Revista Facultad de Ingeniería, 27(47), 73-80. https://doi.org/10.19053/01211129.v27.n47.2018.7748. http://repositorio.uptc.edu.co/handle/001/2163.
2357-5328
http://repositorio.uptc.edu.co/handle/001/2163
10.19053/01211129.v27.n47.2018.7748
identifier_str_mv Acosta López, A., Melo Monroy, E. Y. & Linares Murcia, P. A. (2018). Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools. Revista Facultad de Ingeniería, 27(47), 73-80. https://doi.org/10.19053/01211129.v27.n47.2018.7748. http://repositorio.uptc.edu.co/handle/001/2163.
2357-5328
10.19053/01211129.v27.n47.2018.7748
url http://repositorio.uptc.edu.co/handle/001/2163
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv D. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/elsecreto- de-la-nube [Accessed Apr. 30, 2017].
R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redesinalambricas- principales-protocolos/ [Accessed Apr. 28, 2017].
A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.
Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel. la/content/www/xl/es/support/articles/000005725/ network-and-i-o/wireless-networking.html [Accessed May. 20 2017].
IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http:// ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].
J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/ project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].
Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia. com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].
S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.
Wifislax “Presentación,” [Online] Available: http:// www.wifislax.com [Accessed Jun. 4, 2017].
A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc. es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].
Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].
VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation. html [Accessed Mar, 30 2017].
Revista Facultad de Ingeniería;Volumen 27, número 47 (Enero-Abril 2018)
dc.rights.none.fl_str_mv Copyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombia
https://creativecommons.org/licenses/by-nc/4.0/
info:eu-repo/semantics/openAccess
Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)
http://purl.org/coar/access_right/c_abf2
rights_invalid_str_mv Copyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombia
https://creativecommons.org/licenses/by-nc/4.0/
Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
application/pdf
dc.publisher.none.fl_str_mv Universidad Pedagógica y Tecnológica de Colombia
publisher.none.fl_str_mv Universidad Pedagógica y Tecnológica de Colombia
dc.source.none.fl_str_mv https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138
reponame:RiUPTC: Repositorio Institucional UPTC
instname:Universidad Pedagógica y Tecnológica de Colombia
instacron:Universidad Pedagógica y Tecnológica de Colombia
instname_str Universidad Pedagógica y Tecnológica de Colombia
instacron_str Universidad Pedagógica y Tecnológica de Colombia
institution Universidad Pedagógica y Tecnológica de Colombia
reponame_str RiUPTC: Repositorio Institucional UPTC
collection RiUPTC: Repositorio Institucional UPTC
_version_ 1841545974178119680
spelling Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng toolsEvaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ngAvaliação de segurança em protocolo de rede sem fio WPA2-PSK usando as ferramentas Linset e Aircrack-ngAcosta López, AlbertoMelo Monroy, Elver YesidLinares Murcia, Pablo AndrésInformation securityData transmission systemsData securityIntrusion detectionWireless security1 recurso en línea (páginas 73-80).Devido ao surgimento de novas técnicas e tecnologias de intrusão, os protocolos de redes sem fio ficam obsoletas; para isso, busca-se vulnerar a segurança do protocolo WPA2, que é amplamente usado pelos provedores de serviços colombianos. Na primeira parte, o artigo faz uma introdução do protocolo WPA2, descrevendo seu funcionamento e os ataques dos quais pode ser objeto; na segunda parte mostra-se a metodologia que se usou para recolher provas e realizar a avaliação necessária para a elaboração deste documento. Apresentam-se as ferramentas para auditoria das redes sem fio Linset e Aircrack-ng, as quais foram selecionadas para a avaliação de segurança do protocolo. Finalmente, mostram-se os resultados e as conclusões.Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions.Debido al surgimiento de nuevas técnicas y tecnologías de intrusión, los protocolos de redes inalámbricas quedan obsoletos; para ello se busca vulnerar la seguridad del protocolo WPA2, que es ampliamente usado por los proveedores de servicios colombianos. En la primera parte, el artículo hace una introducción del protocolo WPA2, describiendo su funcionamiento y los ataques de los cuales puede ser objeto; en la segunda parte se muestra la metodología que se usó para recolectar pruebas y realizar la evaluación necesaria para la elaboración de este documento. Se presentan las herramientas para auditoría de las redes inalámbricas Linset y Aircrack-ng, las cuales fueron seleccionadas para la evaluación de seguridad del protocolo. Finalmente, se muestran los resultados y las conclusiones.Bibliografía y webgrafía: páginas 79-80.Universidad Pedagógica y Tecnológica de Colombia2018-09-07T20:30:39Z2018-09-07T20:30:39Z2018-01-15Artículo de revistahttp://purl.org/coar/resource_type/c_6501info:eu-repo/semantics/articleinfo:eu-repo/semantics/publishedVersionTexthttps://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a85application/pdfapplication/pdfAcosta López, A., Melo Monroy, E. Y. & Linares Murcia, P. A. (2018). Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools. Revista Facultad de Ingeniería, 27(47), 73-80. https://doi.org/10.19053/01211129.v27.n47.2018.7748. http://repositorio.uptc.edu.co/handle/001/2163.2357-5328http://repositorio.uptc.edu.co/handle/001/216310.19053/01211129.v27.n47.2018.7748https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138reponame:RiUPTC: Repositorio Institucional UPTCinstname:Universidad Pedagógica y Tecnológica de Colombiainstacron:Universidad Pedagógica y Tecnológica de ColombiaengD. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/elsecreto- de-la-nube [Accessed Apr. 30, 2017].R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redesinalambricas- principales-protocolos/ [Accessed Apr. 28, 2017].A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015.Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel. la/content/www/xl/es/support/articles/000005725/ network-and-i-o/wireless-networking.html [Accessed May. 20 2017].IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http:// ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017].J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/ project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017].Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia. com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017].S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004.Wifislax “Presentación,” [Online] Available: http:// www.wifislax.com [Accessed Jun. 4, 2017].A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc. es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017].Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017].VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation. html [Accessed Mar, 30 2017].Revista Facultad de Ingeniería;Volumen 27, número 47 (Enero-Abril 2018)Copyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombiahttps://creativecommons.org/licenses/by-nc/4.0/info:eu-repo/semantics/openAccessAtribución-NoComercial 4.0 Internacional (CC BY-NC 4.0)http://purl.org/coar/access_right/c_abf22021-02-10T12:57:08Z