Wireless networks are popular but lack security, exposing users to risks like eavesdropping, unauthorized access, and denial of service attacks. To address these issues, solutions like encryption, network segmentation, access control, strong authentication, filtering, and ACLs can be applied. While complete security is impossible, adopting best practices can reasonably mitigate risks for most users.
Wireless networks are popular but lack security, exposing users to risks like eavesdropping, unauthorized access, and denial of service attacks. To address these issues, solutions like encryption, network segmentation, access control, strong authentication, filtering, and ACLs can be applied. While complete security is impossible, adopting best practices can reasonably mitigate risks for most users.
Wireless networks are popular but lack security, exposing users to risks like eavesdropping, unauthorized access, and denial of service attacks. To address these issues, solutions like encryption, network segmentation, access control, strong authentication, filtering, and ACLs can be applied. While complete security is impossible, adopting best practices can reasonably mitigate risks for most users.
Wireless networks are popular but lack security, exposing users to risks like eavesdropping, unauthorized access, and denial of service attacks. To address these issues, solutions like encryption, network segmentation, access control, strong authentication, filtering, and ACLs can be applied. While complete security is impossible, adopting best practices can reasonably mitigate risks for most users.
Wireless network is a network set up by using radio signal frequency to communicate among computers and other network devices. Sometimes it’s also referred to as Wi-Fi network or WLAN. This network is getting popular nowadays due to easy to setup feature and no cabling involved. Wireless security is the prevention of unauthorized access or damage to computers or data using wireless networks, which include Wi-Fi networks. The most common type is Wi-Fi security, which includes Wired Equivalent Privacy and Wi-Fi Protected Access. Wireless network security primarily protects a wireless network from unauthorized and malicious access attempts.
LITERATURE REVIEW
Wireless network is a dynamic research
domain. WLAN in the areas of quality of service architecture, admission control, voice and video streaming, scheduling, bandwidth allocation and load balancing . This thesis is concerned with the literature from the following research domains. OBJECTIVE Understand the benefits of a wireless network. Understand security risks Examples of vulnerabilities Methods to protect your network assuring that the information stored in the computer is never contaminated or changed in a way that is not appropriate. keeping information away from people who should not have it. Accomplishing this objective requires that we know what data we are protecting and who should have access to it. SECURITY ISSUES SECURITY ISSUES 1. Traffic analysis 2. Eavesdropping 3. Unauthorized access 4. Denial of Service (DoS) 5. Dictionary-Building Attacks Traffic analysis
This technique enables the attacker to have the
access to three types of information. The first type of information is related to identification of activities on the network. The second type of information important to the attacker is identification and physical location of access point in its surroundings. The third type of information an attacker can get by traffic analysis is information about the communication protocol Eavesdropping
attacker secretly listens to the private
conversation of others without their permission.
Eavesdropping attacks include passive
eavesdropping, Unauthorized access
Once the attacker gets the access to the
network, he is able to initiate some other types of attacks or use network without being noticed. Some can be of an opinion that unauthorized use of the network is not a significant threat to the network since the access rights allocated to resources will disable the attackers. Denial of Service (DoS)
An attacker tampers with the data before it is
communicated to the sensor node. It causes denial of service attack due to wrong or misleading information. Jamming is one of DoS attack on network availability IP Spoofing IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets. IP Spoofing involves modifying the packet header with a forged (spoofed) source IP address, a checksum, and the order value. Internet is a packet switched network, which causes the packets leaving one machine may be arriving at the destination machine in different order. The receiving machine resembles the message based on the order value embedded in the IP header. IP spoofing involves solving the algorithm that is used SOLUTION SOLUTIONS-Traffic analysis
Awake Security Platform is a network traffic
analysis solution that focuses on discovering, assessing, and processing security threats. The tool is broken down into three parts Awake Sensors, which continuously monitor and collect data from devices, apps, and users Awake Nucleus, which analyzes that data to understand behaviors and attributes of entities and applying deep forensics SOLUTIONS - Eavesdropping Entertaining encryption strategy will secure you a way out from eavesdropping. Using encryption measures like digital certificates will definitely lessen the risk of eavesdropping attacks.
Apply network segmentation which will prevent eavesdropping
as well as other network attacks.
Employing Network Access Control enhances the security of
your network by checking the authenticity of every device before establishing any connection SOLUTIONS- Unauthorized access
Enforce strong authentication strategies.
Keeping usernames and passwords secret
from the unreliable sources. Not providing unnecessary access to any user or even to any employee. SOLUTIONS-Denial of Service (DoS) 1. Contact your Internet Service provider Notify Internet Service Provider as soon as possible to determine if your traffic can be rerouted Having a backup ISP is a good idea, too. Investigate black hole routing 2. Investigate black hole routing It directs excessive traffic into a null route, sometimes referred to as a black hole. This can help prevent the targeted website or network from crashing. SOLUTIONS - IP Spoofing Filtering of packets entering into the network is one of the methods of preventing Spoofing. In other hand, filtering of incoming and outgoing traffic should also be implemented. ACLs helps prevent Spoofing by not allowing falsified IP addresses to enter. Accreditation to encryption should be provided in order to allow only trusted hosts to communicate with. SSL certificates should be used to reduce the risk of spoofing at a greater extent. CONCLUSION In conclusion, nothing is absolutely secure. It is up to you to determine what your acceptable level of risks is and how/when to mitigate them as well as when to deviate from this. I hope this post has scared you a little about using public or retail store Wi-Fi as well as Wi-Fi in hotels and other public places. While the likelihood of you being targeted varies upon who you are and where you are, generally, people are only targeted in evil twin type attacks. I would be concerned if I saw several cars parked on the streets in front of your house late at night. You may want to change your wireless password, review your encryption type, and relocate the antenna