Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 18

WIRELESS NETWORK

SECURITY ISSUES
AND SOLUTIONS

NAME : RUTTHRA DEVI A/P SHANMUGAM(03DDT17F1066)


: RISHAHTINI A/P MURUGIAH (03DDT17F1086)
CLASS: DDT5C
LECTURER’S NAME : EN. JUSRORIZAL
INTRODUCTION
 
 Wireless network is a network set up by using radio signal
frequency to communicate among computers and other network
devices.
 Sometimes it’s also referred to as Wi-Fi network or WLAN.
This network is getting popular nowadays due to easy to setup
feature and no cabling involved.
 Wireless security is the prevention of unauthorized access or
damage to computers or data using wireless networks, which
include Wi-Fi networks.
 The most common type is Wi-Fi security, which includes Wired
Equivalent Privacy and Wi-Fi Protected Access.
 Wireless network security primarily protects a wireless network
from unauthorized and malicious access attempts.
 
LITERATURE REVIEW

 Wireless network is a dynamic research


domain.
 WLAN in the areas of quality of service
architecture, admission control, voice and
video streaming, scheduling, bandwidth
allocation and load balancing .
 This thesis is concerned with the literature
from the following research domains.
OBJECTIVE
 Understand the benefits of a wireless network.
 Understand security risks Examples of vulnerabilities
Methods to protect your network
 assuring that the information stored in the computer is
never contaminated or changed in a way that is not
appropriate.
  keeping information away from people who should not
have it.
 Accomplishing this objective requires that we know
what data we are protecting and who should have
access to it.
SECURITY ISSUES
SECURITY ISSUES
1. Traffic analysis
2. Eavesdropping
3. Unauthorized access
4. Denial of Service (DoS)
5. Dictionary-Building Attacks
Traffic analysis

 This technique enables the attacker to have the


access to three types of information.
 The first type of information is related to
identification of activities on the network.
 The second type of information important to the
attacker is identification and physical location of
access point in its surroundings.
 The third type of information an attacker can get
by traffic analysis is information about the
communication protocol
Eavesdropping

 attacker secretly listens to the private


conversation of others without their
permission.

 Eavesdropping attacks include passive


eavesdropping,
Unauthorized access

 Once the attacker gets the access to the


network, he is able to initiate some other
types of attacks or use network without being
noticed.
 Some can be of an opinion that unauthorized
use of the network is not a significant threat
to the network since the access rights
allocated to resources will disable the
attackers.
Denial of Service (DoS)

 An attacker tampers with the data before it is


communicated to the sensor node.
 It causes denial of service attack due to wrong
or misleading information.
 Jamming is one of DoS attack on network
availability
IP Spoofing
 IP Spoofing is a technique used to gain unauthorized
access to machines, whereby an attacker illicitly
impersonates another machine by manipulating IP
packets.
 IP Spoofing involves modifying the packet header with
a forged (spoofed) source IP address, a checksum, and
the order value.
  Internet is a packet switched network, which causes
the packets leaving one machine may be arriving at the
destination machine in different order.
 The receiving machine resembles the message based
on the order value embedded in the IP header.
 IP spoofing involves solving the algorithm that is used
SOLUTION
SOLUTIONS-Traffic analysis

 Awake Security Platform is a network traffic


analysis solution that focuses on discovering,
assessing, and processing security threats.
 The tool is broken down into three parts
 Awake Sensors, which continuously monitor
and collect data from devices, apps, and users
 Awake Nucleus, which analyzes that data to
understand behaviors and attributes of
entities and applying deep forensics
SOLUTIONS - Eavesdropping
 Entertaining encryption strategy will secure you a way out from
eavesdropping. Using encryption measures like digital
certificates will definitely lessen the risk of eavesdropping
attacks.

 Apply network segmentation which will prevent eavesdropping


as well as other network attacks.

 Employing Network Access Control enhances the security of


your network by checking the authenticity of every device
before establishing any connection
SOLUTIONS- Unauthorized access

 Enforce strong authentication strategies.

 Keeping usernames and passwords secret


from the unreliable sources.
 Not providing unnecessary access to any
user or even to any employee.
SOLUTIONS-Denial of Service (DoS)
1. Contact your Internet Service provider
 Notify Internet Service Provider as soon as
possible to determine if your traffic can be rerouted
 Having a backup ISP is a good idea, too. Investigate
black hole routing
2. Investigate black hole routing
 It directs excessive traffic into a null route,
sometimes referred to as a black hole.
 This can help prevent the targeted website or
network from crashing.
SOLUTIONS - IP Spoofing
 Filtering of packets entering into the network is one of the
methods of preventing Spoofing.
 In other hand, filtering of incoming and outgoing traffic
should also be implemented.
 ACLs helps prevent Spoofing by not allowing falsified IP
addresses to enter.
 Accreditation to encryption should be provided in order to
allow only trusted hosts to communicate with.
 SSL certificates should be used to reduce the risk of
spoofing at a greater extent.
CONCLUSION
 In conclusion, nothing is absolutely secure. It is up to you to
determine what your acceptable level of risks is and
how/when to mitigate them as well as when to deviate from
this. I hope this post has scared you a little about using public
or retail store Wi-Fi as well as Wi-Fi in hotels and other public
places. While the likelihood of you being targeted varies upon
who you are and where you are, generally, people are only
targeted in evil twin type attacks. I would be concerned if I
saw several cars parked on the streets in front of your house
late at night. You may want to change your wireless password,
review your encryption type, and relocate the antenna

You might also like