Abstract
Using Smart Phone, Tablet PC and laptop that SNS, or they want to surf the web to obtain information by connecting to the Internet. But if you use the hacked site Malicious code is downloaded incident occurs. These attacks by the attackers hacked into other servers within the same IP segment after that ARP Spoofing by inserting malicious code associated with a particular Web server intercepts Web Traffic. In this paper, Log in Smart Phone, Tablet PC and Laptop is based, SNS and web site. At this point, Network Packet analysis tools to analyze the contents of the Packet and Encrypted website hacking content and ID, password by hacking incident triggers. Smart Phone, Tablet PC and laptop are presented in the study of security measures for the incident. In this study, Smart Phone, Tablet PC and laptop will contribute that network security Enhance to the development of Hack defense technology.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Teail, J.: If you can not fix security holes drilled away the eternal smart ’half’. Harald Economy (May 2011)
Orebaugh, A., Ramirez, G., Burke, J., Beale, J.: Wireshark and Ethereal network protocol analyzer toolkit. Syngress, 52–53 (2007)
Kalakota, R., Robinson, M.: M-Business: Race to the Mobility. McGraw-Hill Companies, New York (2001)
Chun, W.-S., Park, D.-W.: Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network. IJCSNS International Journal of Computer Science and Network Security 9(12), 291–298 (2009)
Song, J.-y., Park, D.-w.: A Study of Packet Analysis in Smart Phone Internet Access. The Korean Institute of Maritime Information and Commucation Sciences, 229–232 (October 2010)
Yao, Y., Yang, W., Yao, Y., Li, Y.: A switch-based ARP attack containment strategy. In: Communication Systems, Networks and Applications (ICCSNA), pp. 123–126 (June 2010)
Lim, C., Lee, W., Jo, T.-C.: An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks. The Korean Institute of Information Scientists and Engineers 16(6), 631–751 (2010)
Sung-Ryong, K., von Phishing, Z.S.: IT and Raw, pp. 1–359 (February 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Song, JY., Park, DW. (2011). A Study on Wi-Fi Hacking Attack Using Web. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Lecture Notes in Computer Science, vol 6935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24082-9_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-24082-9_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24081-2
Online ISBN: 978-3-642-24082-9
eBook Packages: Computer ScienceComputer Science (R0)