Wireless Network Securities
Wireless Network Securities
Diwan,
Sanjay R. Mate.
College : M M C O E, Pune.
Definition :
Network is connection between two or more equipments, used
for sharing data , resources or communication.
802.11B
Bandwidth up to 11 Mbps.
It has a much better range than 802.11a
Not as easily obstructed by walls or other objects.
Suffer from more interference from other electronic device such as microwaves..
802.11G
Bandwidth up to 54 Mbps
Range that will cover most average homes.
These devices are still typically common in retail stores but are quickly being
Replaced by the newer technologies such as 802.11N.
802.11.N
Bandwidth 600 Mbps
Cover an extremely large home or small business.
Problems/Attacks
DoS Attacks & DDoS Attacks
Threat Integrity Attack
Authentication And Accountability Attack
Channel Jamming
Session Hijacking
Confidentiality Attack
Replies Lost
SYN Attack
(spoofed IP
recipient)
(A)
SYN Flood requests with spoofed IP
(B)
Server
Server Busy
Attackers took all
(C) TCP connections
Attackers
Valid User
DoS Attack
Public Network
( internet )
Company
Valid User
W
(156.12.25.4)
E
B
S
156.12.25.4 132.12.25.1 DATA E
R
V
IP Source ID Destination
E
Hacker R
(168.12.25.5) (132.12.25.1)
IP
Spoofing
IP Spoofing:
When attacker outside your network pretend to be trusted user by
using IP address within range of trusted IP address or by using external IP address
that you trust. Attacker can masquerade as the remote authorized user to connect
your network.
To Overcome Network Attack/problem
SSL
USB Key
SSL
SSL
Certificates database
Data Base
source: nwfusion.com
Rules for WLAN Security
• Activate Physical Layer Security. While WEP has its weaknesses, TKIP, specified as
part of WPA, provides a base level of security. When combined with 802.1X (see rule 3)
it provides a very strong level of security.
• Don’t Broadcast or Use Default SSIDs. By changing the default SSID and
configuring the access point not to broadcast the SSID, the most common sniffing tools
can be rendered useless.
• Use 802.1X User Authentication. When access points are configured to support
802.1X, users are not allowed on the network without proper credentials (user
name/password or certificates). Once authenticated, the client and access point are
provided with unique, random session keys to encrypt the data transfers.
Wi-Fi Protected Access (WPA) overcomes the inherent flaws of early wireless
networks. WPA uses TKIP at the physical layer, and 802.1X security for user
authentication create the basis for strong wireless network security. WPA is
capable of preventing most sophisticated attacks on wireless networks, and there
are no known tools available to crack this level of wireless security.
This approach offers a pragmatic solution to wireless security and can resolve
the single largest barrier to WLAN deployment for IT managers. A cost-effective
solution using 802.1X security can be deployed to deny access to any user without
the proper credentials, and provide strong security for wireless networks.