User security behavior on wireless networks: An empirical study

  • Chenoweth T
  • Minch R
  • Tabor S
  • 12


    Mendeley users who have this article in their library.
  • 2


    Citations of this article.


Wireless networks are rapidly becoming ubiquitous but are often insecure and leave users responsible for their own security. We empirically study whether users are successfully securing their client computers when using wireless networks. Automated techniques are used that scan users' machines after they associate with a university wireless network. This determines whether a firewall is being used and what TCP ports are open. Results show that over 9% of 3,331 unique computers scanned were not using a properly configured firewall. In addition, almost 9% had at least one TCP port open, with almost 6% having open ports with significant security implications. We also found and discuss cases where connected computers were compromised by Trojan programs such as SubSeven and NetBus. We discuss the generalizability of our results to other potentially insecure wireless networks, and suggestions for further research

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Tim Chenoweth

  • Robert Minch

  • Sharon Tabor

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free