attacks and risks in wireless network security

3
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Attacks and R A. C. Department of BCA & MSC.SS, Sri ABSTRACT Wireless networks are mostly commo part of every organisation or an indiv article we look into the technology network and security features of WLAN and attacks in IEEE 802.11 WLAN variety of attack methods that can be us uses of wireless networks. Modern network use a variety of technique obstacles to such attacks. This article al risks of wireless security in an en conclude that combined effort of users, e system administrator is required to figh malevolent activities. Keyword: Network security, risk, WEP k INTRODUCTION Wireless networks became part organisation’s activity with increase in internet, it becomes important communications like e-mail, e-commerc and data transmission secure. The rea clear, as wireless technologies come advantage of being costless, easy to fix mobile. The use of wireless communica around since 1990’s mostly used in obstacles to wireless communication du many, but these barriers are resolved There is a huge growth to the use technology especially in private sector advantages of wireless technologies obvious that business wants to b technology. It seems that there are ma wireless network technologies in the m one which outstands is WLAN based o we exploit the weaknesses of wireless list the various types of attacks possible nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct Risks in Wireless Network Secu Sountharraj 1 , B. VeeraPandiyan 2 1 Assistant Professor, 2 Student i Krishna Arts & Science College, Kuniyamuthu on and are the vidual. In this y of wireless Ns, delinquent Ns. There are sed against the wireless data es to provide lso discuss the nterprise. We employers and ht against such key of every the use of the t to keep ce transactions asons are very es with huge up and totally ation has been patented. The uring 90’s were in these days. e of wireless rs. The strong s it becomes build such a any variety of market, but the on 802.11 then networks and on them[1]. TECHNOLOGY OF WIREL Wireless communication tec alternative to traditional wire n networks relay on cables to together, wireless network technologies. Wireless techno in both home and business co cost device is the foremos technology in acquisition po cost equipment’s also facilitate attack. And these arrives nee well established wireless netw VULNERABILITIES NETWORK: Vulnerabilities are common wireless networks. The attack that exploit the “over air” wireless signals use the eav attacks evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 930 urity ur, Coimbatore, India LES NETWORK: chnology is a modern networking where wired connect digital devices ks relay on wireless ologies are widely used omputer networks. Low st reason for wireless opularity. But such low es attackers to deploy an ed to have a secure and work in an enterprise. OF WIRELESS n for both wired and ks on wireless networks characteristics of the vesdropping and MITM

Upload: ijtsrd

Post on 17-Aug-2019

4 views

Category:

Education


0 download

DESCRIPTION

Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. A. C. Sounthararaj | B. VeeraPandiyan "Attacks and Risks in Wireless Network Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18625.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-network/18625/attacks-and-risks-in-wireless-network-security/a-c-sounthararaj

TRANSCRIPT

Page 1: Attacks and Risks in Wireless Network Security

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Attacks and Risks iA. C.

Department of BCA & MSC.SS, Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India

ABSTRACT Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent and attacks in IEEE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the risks of wireless security in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such malevolent activities. Keyword: Network security, risk, WEP key INTRODUCTION Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep communications like e-mail, e-commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge advantage of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days. There is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of wireless network technologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1].

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

and Risks in Wireless Network Security

C. Sountharraj1, B. VeeraPandiyan2 1Assistant Professor, 2Student

Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India

Wireless networks are mostly common and are the part of every organisation or an individual. In this article we look into the technology of wireless network and security features of WLANs, delinquent

EE 802.11 WLANs. There are variety of attack methods that can be used against the uses of wireless networks. Modern wireless data network use a variety of techniques to provide obstacles to such attacks. This article also discuss the

rity in an enterprise. We conclude that combined effort of users, employers and system administrator is required to fight against such

Network security, risk, WEP key

Wireless networks became part of every organisation’s activity with increase in the use of the internet, it becomes important to keep

commerce transactions and data transmission secure. The reasons are very clear, as wireless technologies comes with huge

of being costless, easy to fix up and totally mobile. The use of wireless communication has been around since 1990’s mostly used in patented. The obstacles to wireless communication during 90’s were many, but these barriers are resolved in these days.

e is a huge growth to the use of wireless technology especially in private sectors. The strong advantages of wireless technologies it becomes obvious that business wants to build such a technology. It seems that there are many variety of

echnologies in the market, but the one which outstands is WLAN based on 802.11 then we exploit the weaknesses of wireless networks and list the various types of attacks possible on them[1].

TECHNOLOGY OF WIRELES NETWORK:Wireless communication technologyalternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer netcost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in

VULNERABILITIES OF WIRELESS NETWORK: Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM attacks

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 930

n Wireless Network Security

Sri Krishna Arts & Science College, Kuniyamuthur, Coimbatore, India

TECHNOLOGY OF WIRELES NETWORK: Wireless communication technology is a modern alternative to traditional wire networking where wired networks relay on cables to connect digital devices together, wireless networks relay on wireless technologies. Wireless technologies are widely used in both home and business computer networks. Low cost device is the foremost reason for wireless technology in acquisition popularity. But such low cost equipment’s also facilitates attackers to deploy an attack. And these arrives need to have a secure and well established wireless network in an enterprise.

VULNERABILITIES OF WIRELESS

Vulnerabilities are common for both wired and wireless networks. The attacks on wireless networks that exploit the “over air” characteristics of the wireless signals use the eavesdropping and MITM

Page 2: Attacks and Risks in Wireless Network Security

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Eavesdropping: Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available. MITM attacks: It is known as MAN-IN-THE-MIDDLE attack. The MITM attack is one step beyond the Eavesdropping attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly communicates with each other. In addition there is the possibility to acquire unauthorized wireless access from a wireless service point. The techniques that can be used are as follows:� Rogue Access Points � Rogue Clients � Open Access Points � WEP Key Attacks � Jamming � High Gain Antennas Rogue Access Points: A Rogue Access Points that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a employee or by an attacker. Rogue Clients: Enough client is a client that doesn’t belong to your company but it is operating on your network anyway. Open Access Point: An Access Point is a device such as a wireless that permits wireless devices to connect to a network. WEP Key Attacks: WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network Jamming: Jamming attacks are saviour denial -attacks against wireless median High Gain Antennas: A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength. SECURITY FEARURES OF WLAN’sThe major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Eavesdropping can be described as accidently over hearing a conversation and thus gaining important information which is not easily available.

MIDDLE attack. The yond the Eavesdropping

attack[2]. This is an attack where the person secretly relays and possibly alters the communication between two parties who believe they are directly

In addition there is the possibility to acquire thorized wireless access from a wireless service

point. The techniques that can be used are as follows:

been installed on a secure network without explicit authorization from a local network administrator, whether added by a

Enough client is a client that doesn’t belong to your etwork anyway.

An Access Point is a device such as a wireless router permits wireless devices to connect to a network.

WIRED EQIVALENT PRIVACY is a security algorithm for IEEE 802.11 wireless network

- of - service

A High Gain Antenna is an antenna with a narrow radio beam that is used to increase signal strength.

SECURITY FEARURES OF WLAN’s The major security services for IEEE802.11 are provided by wired equivalent privacy protocol. As per

the IEEE standards there are three basic security features described for wireless networks. They are � Authentication � Confidentiality � Integrity. Authentication: A primary goal of WEP (PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate Confidentiality: Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping. Integrity: Another goal of WEP was a security service created to ensure that messages are not modwireless clients and access the point in an active attack. THE RISKS OF WIRELESS SECURITY IN AN ENTERPRISE: For an enterprise there is lot more than just protecting the network from various attacks. There are different measures enterprise can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the system itself finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take advantages of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as sincere uses of the enterprise. Conclusion: Wireless network security faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of business. These strength of the system security is always countered by its weakest component. So the

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 931

the IEEE standards there are three basic security features described for wireless networks. They are

WEP (WIRED EQIVALENT PRIVACY) was to provide a security service to check the ID of communicative clients stations. This gives access control to the network by avoiding access to the client station that cannot authenticate properly.

Confidentiality, or Privacy, was a second goal of WEP the intent was to prevent information compromise from causal eavesdropping.

Another goal of WEP was a security service created to ensure that messages are not modified in transit wireless clients and access the point in an active

THE RISKS OF WIRELESS SECURITY IN AN

For an enterprise there is lot more than just protecting the network from various attacks. There are different

can take, in order to secure their network and the most important one is to keep their wireless access points as safe as possible. The Important reason to keep access points safe is that the attackers do not require specific packing tools as the

self finds the network when it comes in the range. One of the major risks for an enterprise from their own naïve employees the can contact company databases from a browser and they do the same when the want to work at home. The attackers can take

s of this and instead of breaking into the security system they would observer the activities of employees and given a chance would get enough knowledge that they can then trick themselves as

curity faces a number of hurdles and efforts are being put on, but are relatively new and thus not fully developed. Since wireless technology has huge market but has become almost inexpensive. It is gaining popularity in all sorts of

th of the system security is always countered by its weakest component. So the

Page 3: Attacks and Risks in Wireless Network Security

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

end-users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users, employers and system administrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of illegal penetration.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

users must be given proper training on how to secure the data when they are at home or at the private sectors. So that the combined effort of users,

inistrators against such malicious activities. Appropriate counter measures can help the organisation to minimise the risk of

REFERENCES: 1. https://www.researchgate.net/...A.../Wireless

Network-Security-A-filed-2. https://epdf.tips/handbook-

networks-applications-technologyst.html

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 932

https://www.researchgate.net/...A.../Wireless--Study -of-wireless-local-area-

technology-security-and-