1 / 3

Attacks and Risks in Wireless Network Security

Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18625.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-network/18625/attacks-and-risks-in-wireless-network-security/a-c-sounthararaj<br>

Télécharger la présentation

Attacks and Risks in Wireless Network Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Journal of Trend in International Open Access Journal International Open Access Journal | www.ijtsrd.com International Journal of Trend in Scientific Research and Development (IJTSRD) Research and Development (IJTSRD) www.ijtsrd.com ISSN No: 2456 ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep 6 | Sep – Oct 2018 Attacks and Risks i and Risks in Wireless Network Security n Wireless Network Security Sountharraj1, B. VeeraPandiyan2 1Assistant Professor, 2Student A. C. Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India ABSTRACT Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. Keyword: Network security, risk, WEP key INTRODUCTION Wireless networks became organisation’s activity with increase in the use of the internet, it becomes communications like e-mail, e-commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge advantage of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. There is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of wireless network technologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology is a modern alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer networks. Low cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in an enterprise. TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer net cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent EE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the rity in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such Network security, risk, WEP key Wireless organisation’s activity with increase in the use of the internet, it becomes networks became part part of of every every important important commerce transactions to to keep keep and data transmission secure. The reasons are very clear, as wireless technologies comes with huge of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. e is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of echnologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1]. VULNERABILITIES NETWORK: Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM attacks VULNERABILITIES OF OF WIRELESS WIRELESS Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 930

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Eavesdropping: Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MITM attacks: It is known as MAN-IN-THE-MIDDLE attack. The MITM attack is one step beyond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe communicates with each other. In addition there is the possibility to acquire unauthorized wireless access from a wireless service point. The techniques that can be used are as follows: ?Rogue Access Points ?Rogue Clients ?Open Access Points ?WEP Key Attacks ?Jamming ?High Gain Antennas Rogue Access Points: A Rogue Access Points that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a employee or by an attacker. Rogue Clients: Enough client is a client that doesn’t belong to your company but it is operating on your network anyway. Open Access Point: An Access Point is a device such as a wireless that permits wireless devices to connect to a network. WEP Key Attacks: WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network Jamming: Jamming attacks are saviour denial - attacks against wireless median High Gain Antennas: A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per provided by wired equivalent privacy protocol. As per the IEEE standards there are three basic security features described for wireless networks. They are the IEEE standards there are three basic security features described for wireless networks. They are ?Authentication ?Confidentiality ?Integrity. Authentication: A primary goal of WEP ( PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate Confidentiality: Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Integrity: Another goal of WEP was a security service created to ensure that messages are not mod wireless clients and access the point in an active attack. THE RISKS OF WIRELESS SECURITY IN AN ENTERPRISE: For an enterprise there is lot more than just protecting the network from various attacks. There are different measures enterprise can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the system itself finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take advantages of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as sincere uses of the enterprise. Conclusion: Wireless network security faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of business. These strength of the system security is always countered by its weakest component. So the always countered by its weakest component. So the Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MIDDLE attack. The yond the Eavesdropping WEP (WIRED EQIVALENT attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate properly. they they are are directly directly In addition there is the possibility to acquire thorized wireless access from a wireless service point. The techniques that can be used are as follows: Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Another goal of WEP was a security service created to ensure that messages are not modified in transit wireless clients and access the point in an active THE RISKS OF WIRELESS SECURITY IN AN been installed on a secure network without explicit authorization from a local network administrator, whether added by a For an enterprise there is lot more than just protecting the network from various attacks. There are different can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the self finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take s of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as Enough client is a client that doesn’t belong to your etwork anyway. An Access Point is a device such as a wireless router permits wireless devices to connect to a network. WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network - of - service curity faces a number of hurdles A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of th of the system security is SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 931

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 REFERENCES: 1.https://www.researchgate.net/...A.../Wireless Network-Security-A-filed- 2.https://epdf.tips/handbook- networks-applications-technology st.html end-users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, employers and system administrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of illegal penetration. users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, https://www.researchgate.net/...A.../Wireless- -Study -of-wireless-local-area- technology-security-and- inistrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 932

More Related