Location-based sniffing threat model

When a hacker performs malicious actions, such as broadcasting a rogue SSID, on a wide-scale network, it may not always be obvious. However, if WLAN traffic data is able to be collected at multiple locations of that network’s reach, then patterns can be observed over time, which can potentially lead to capturing various bad actors. Additionally, we wanted to assess what type of analysis we could do on WLAN traffic collected around the University of Virginia. We used a Raspberry Pi and Kismet, an open source network sniffing tool, to collect data.

Kasra Lekan
Kasra Lekan
Master’s Student

My research interests include natural language processing, human-AI interaction, and modelling complex systems.