1|PageWireless Network Threats: Firewall CountermeasuresEnebeli Edwin NdudiCourse: MSC. Computer Science (Software Enginee...
2|PageWhen laptops are connected to Wi-Fi                      wired/wireless network by describing ithot   spots      in ...
3|Pagethe key issues related to information           through wide area networks and thesecurity.                         ...
4|Pagesystems (Wang, 2004). Security is an                   Denial-of-service      attacks   can   beimportant issue, so ...
5|Page4.0 Threat Countermeasures:                        i.Very little data is analyzed andFirewalls                      ...
6|Pagealso provide extensive packet analysis.                ii. The application commands areThe client needs to provide v...
7|Pageclean based on particular session rules             ii. Circuit-level gateways firewall isand may be controlled to a...
8|Pageiv. Evaluate the available firewall                   Packet-filtering firewalls works at theproducts. Firewalls var...
9|Pagegateway      firewall      monitors      TCP         use a variety of techniques to protecthandshaking between packe...
10 | P a g e[2] Makki, S. K., Reiher , P., Makki ,         [4] Pandey, S. (2011). Modern networkK., Pissinou , N., & Makki...
Upcoming SlideShare
Loading in …5

Wireless network security threats countermeasure


Published on

Published in: Education, Technology
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Wireless network security threats countermeasure

  1. 1. 1|PageWireless Network Threats: Firewall CountermeasuresEnebeli Edwin NdudiCourse: MSC. Computer Science (Software Engineering)Faculty of Computer Science & IT, Universiti Selangor, 40000 Shah Alam, MalaysiaAbstractEver since wireless network security threat issues arises, several countermeasureshave been adopted such as the use of ant-viruses software, network firewall and othercountermeasure approach to tackle threats issues across computer network. Thispaper is focusing on the use of firewall as a method of dealing with network securitychallenges. Many internet users today doesn’t know how firewalls works; it benefits,drawback, and it categories. Sometimes, when system firewall block some suspiciouswebpage content and application access users were always optioned to turn offfirewalls to grant access to those website or application without that they are threatsto peoples information’s. This paper is creating awareness about threats on wirelessnetwork and how to avoid them by using network firewalls. The main objective of thisresearch is to demonstrate wireless network security threat countermeasures usingfirewall, also to determine how firewall works. The advantages and disadvantages offirewall are to be determined in this paper in order to foresee why or not a firewallshould be a network threat countermeasure. These papers also propose quite numberof solutions for dealing with those threats associated with warless network.Keywords: Wireless Network Security, Threats Countermeasures, Network Firewalls.1.0 Introduction process of introducing cables into buildings or as a connection betweenWireless networks are computer different equipment locations. Wirelessnetworks that are not connected by networks use radio waves to connectcables of any type. Wireless network devices such as laptops to the Internet,enables enterprises to avoid the costly the business network and applications.Firewall Countermeasures Edwin 2013
  2. 2. 2|PageWhen laptops are connected to Wi-Fi wired/wireless network by describing ithot spots in public places, the advantages and disadvantages in orderconnection is established to that to see if firewall is a good networkbusiness’s wireless network. threats approach of dealing with network security challenges. A firewallHowever, wireless technology also is something that the user of thecreates new threats and alters the computer is responsible for checkingexisting information security risk and installing. The security levelsprofile. For example, because provided by the firewall can be alteredcommunications takes place "through just as any other control function canthe air" using radio frequencies, the risk be altered. Security experts say that theof interception is greater than with best way to stay safe online is to onlywired networks. If the message is not visit websites that one trust or that youencrypted, or encrypted with a weak are sure are secure but doesn’talgorithm, the attacker can read it, guarantee safety .thereby compromising confidentiality.Although wireless networking alters the A. Wireless Network Securityrisks associated with various threats to Secured network has now become asecurity, the overall security objectives need of any organization. The securityremain the same as with wired threats are multiplying everyday andnetworks: preserving confidentiality, making high speed wired and wirelessensuring integrity, and maintaining network and internet services, insecureavailability of the information and and undermining network reliability.information systems. The This day’s security measures worksdisadvantages of using a wireless more importantly towards fulfilling thenetwork are: Security, Range, cutting edge demands of today’sReliability, and Speed. Network growing industries (Pandey, 2011). Thefirewall has been one of network need is also induced in to the areas likesecurity threat countermeasure, the aim defence, where secure andof this paper is to scrutinize how authenticated access of resources arefirewall counter security threat inFirewall Countermeasures Edwin 2013
  3. 3. 3|Pagethe key issues related to information through wide area networks and thesecurity. Internet. A firewall protects computers by acting as a gate through which allB. What is Firewall? data must pass. By blocking certainA firewall is a virtual wall/gateway in kinds of traffic, the firewall protectsother words software, which is located computers or network frombetween internal and external networks. unauthorized users and safeguards dataFirewalls can be an effective means of from attack. Setting up a firewall hasprotecting an intranet from network- distinct advantages and disadvantages.based security threads that come from Most computer operating system comesoutside networks while in the mean with firewall installed on it, and can betime providing access to outside world purchased and stored installed.2.0 Why Firewalls Are NecessaryA vast number of local intranets form intranet and internet is essential andthe global internet, which allows one to absolutely necessary. On the internet itobtain from as well as to provide is a virtual world, but it is just like theinformation to the whole world. Since real world, where be malicious usersthe internet access provides such who snoop on other’s valuablebenefits to any personal and information or even some criminalsorganizations, the connection between who enjoy bringing down otherFirewall Countermeasures Edwin 2013
  4. 4. 4|Pagesystems (Wang, 2004). Security is an Denial-of-service attacks can beimportant issue, so a virtual firewall implemented using common internetneeds to be built up around internal protocols, such as TCP and ICMP.network to protect both physical and 3.3 Source Routed Trafficabstract resources in the intranet. Usually a network packet itself only3.0 Types of Attack says where it wants to go, and nothingIn order to understand the firewalls about how it expects to get there. Butimplementation, its important to sometime the sender of a packet canunderstand the most common methods include information in the packet thatof attacking wireless network. Some of tells the route the packet should take tothem are listed below. get to its destination. This is called source routing. This can be used to3.1 IP Spoofing Attacks bypass the security measures.In this type of attack, an attacker 3.4 Tiny fragment attacksoutside the local intranet may pretendto be a trusted computer either by using Here an attacker creates extremelyan IP address that is within the range of small packet fragments by takingIP addresses for the local network or by advantage of the IP fragmentationusing an authorized external IP address option. The attacker hopes that only thethat has authorized access to specified first fragment is examined by theresources on the local network. security measures and the others can pass through safely.3.2 Denial of Service Attacks Tiny fragment attack is designed to foolThe purpose of these attacks is just to a firewall or packet filter by creating anmake a service unavailable for normal initial fragment that is very small. It isuse by flooding the network with so small that it does not contain TCPundesired, and often useless, network port number; instead the TCP portpackets to exhaust the resource number follows in the second packet.limitation on the network or within anoperating system or application.Firewall Countermeasures Edwin 2013
  5. 5. 5|Page4.0 Threat Countermeasures: i.Very little data is analyzed andFirewalls logged; filtering firewalls take less CPU and create less latency in yourFirewall simply blocks any network.unauthorized communication betweeninternal and external networks. ii. The user does not have to considerBasically, there are three basic types of blocking rules in their applications, sofirewalls which include packet-filtering filtering firewalls are more transparentfirewalls, application- level gateway to the user.and circuit-level gateway. 4.1.2 Disadvantages of Packet4.1.0 Packet-filtering firewalls Filtering FirewallsA Packet Filtering firewalls is normally i. Whenever some rules are based on IPimplemented by configuring a router to numbers and the network is usingfilter packets going in both directions. dynamic IP assignment, this can be aIt works at the IP network layer. A problem, because the dynamic IP ispacket filtering router usually can filter changed sometimes, IP address cannot(i.e. block) IP packets based on some or be specified to be filtered.all of the following fields: Source IP ii. Packet filtering rules are complex toaddress, Destination IP address, specify and usually no testing facilityTCP/UDP source port, and TCP/UDP exists for verifying the correctness ofdestination port. The packet filter is the rulestypically set up as a list of rules basedon matches to IP address or TCP/UDP 4.2.0 Application-Level Gatewayport number to block connections from Application-level gateways firewalls,or to specific hosts or networks, and to also called proxy-based firewalls,block connections to specific ports. operate at the application level. They4.1.1 Advantages of Packet Filtering are usually implemented byFirewalls implementing separate proxy application for each service. They provide all the basic proxy features andFirewall Countermeasures Edwin 2013
  6. 6. 6|Pagealso provide extensive packet analysis. ii. The application commands areThe client needs to provide valid user analyzed inside the payload portion ofID and authentication information to the data packets.the proxy server in order to 4.2.2 Disadvantages of Application-communicate with the destination Level Gateways Firewallsservice. In effect, the proxy establishesthe connection with the destination i. Application-level gateways firewallsbehind the firewall and acts on behalf is slower than packet filtersof the client, hiding and protecting ii. Needs the internal client to know about them.individual computers on the network iii. In Application-level gatewaysbehind the firewall. Since all firewalls every possible type ofcommunication is conducted through connection cannot be supportedthe proxy server, computers behind the 4.3.0 Circuit-Level Gatewayfirewall are protected. A typical Firewallsapplication-level gateway can provide Circuit level gateways work at theproxy services for applications and session layer of the OSI model, or as aprotocols like Telnet, FTP (file "shim-layer" between the applicationtransfers), HTTP (Web services), and layer and the transport layer of theSMTP (e-mail). TCP/IP stack. They monitor TCP4.2.1 Advantages of Application- handshaking between packets toLevel Gateways Firewalls determine whether a requested session is legitimate. Information passed to ai. Direct connections between internal remote computer through a circuit leveland external hosts are disallowed and gateway appears to have originatedunauthorized access is restricted. from the gateway. Circuit-Levelii. In Application-level gateways Firewalls applications represent thefirewalls, user-level authentication is technology of next to first generationsupported. .Firewall technology supervise TCP handshaking among packets to confirm a session is genuine. Firewall traffic isFirewall Countermeasures Edwin 2013
  7. 7. 7|Pageclean based on particular session rules ii. Circuit-level gateways firewall isand may be controlled to acknowledged simpler to implementcomputers only. Circuit-level firewalls 4.3.2 Disadvantages of Circuitconceal the network itself from the Level-Gatewaysexternal, which is helpful forcontradicting access to impostors. But i. In circuit level-gateways, an activeCircuit-Level Firewalls dont clean content cannot be scanned orentity packets. This is useful for hiding disallowed commands.information about protected networks. ii. Circuit level-gateways can onlyCircuit level gateways are relatively handle TCP connections and newinexpensive and have the advantage of extensions is proposed for UDPhiding information about the privatenetwork they protect. On the other 5.0 Firewall Design Principleshand, they do not filter individual To design a firewall for a network,packets. briefly there are several aspects needed4.3.1 Advantages of Circuit-Level to be considered:Gateways i. The attacks you intend to deal with:i. One of the best advantages of circuit- Various threats a lied across wirelesslevel gateways firewall is the private network, its highly recomposed thatnetwork data hiding whole information flow should be accessed to find which one that requiresii. Avoidance of filtering individual urgent actions and which firewallpackets should be used.iii. Flexible in developing address ii. The services you intend to offer toschemes external networks from your protectedi. Circuit-level gateways firewall don’t network.need a separate proxy server for each iii. The services you intend to requestapplication from external networks via your protected network.Firewall Countermeasures Edwin 2013
  8. 8. 8|Pageiv. Evaluate the available firewall Packet-filtering firewalls works at theproducts. Firewalls variety should be IP network layer, application-levelevaluated to determine their network gateway operates at the applicationthreat countermeasure suitability. layer why the Circuit level gateways work at the session layer. In the recentGenerally, if cost, speed, flexibility, years, studies have shown thatand ease of use are strong motivators, a application layer has been the popularpacket-filtering firewall is the best route attacker’s uses to launch an attackchoice. But because each type of on a vulnerable computer wirelessimplementation has its own network. Therefore, application-leveldisadvantage and advantage, so if you gateways are highly recommended tocan afford it, it is better to have multi- counter threats lies on application levellevel firewall architecture to achieve of OSI model. In packet-filteringthe securest network. firewalls, the packet filter is set up as a5.0 Discussion list of protocols based on matches to IP address or TCP/UDP port number toThe security levels provided by block connections from or to specificnetwork firewalls can be altered just as hosts or networks, and to blockany other control function can be connections to specific ports;altered. Setting up or installing an application-level gateway are usuallyInternet firewall is intentionally very implemented by initiating a separatesimple. Most computers come with a proxy application for each service.firewall program. The only thing thatthe user needs to do is set the settings Application-level gateway firewallsfor the firewall. Circuit-level gateways purvey all the basic proxy features andfirewall is a type of firewalls that is also provide an extensive packetvery simple to implement comparing to analysis. In this type of firewall, clientother types but can only handle TCP needs to provide valid user identity andconnections why new extensions authentication information to the proxyproposed is for UDP. server so that it can communicate with the destination service. Circle-levelFirewall Countermeasures Edwin 2013
  9. 9. 9|Pagegateway firewall monitors TCP use a variety of techniques to protecthandshaking between packets in order against attacks. As proxy servers,to determine if the requested session is firewalls mask IP address and limitvalid. All the information’s waded to a traffic types. External computersremote computer through a circuit level communicate with them, instead. Asgateway appears to have originated circuit-level gateways, firewalls limitfrom the gateway connections to trusted networks only. Packet-filtering firewalls examine each7.0 Conclusion packet, rejecting those that fail securityWireless networking provides several testing. This paper has successfullyopportunities to increase productivity scrutinized how works firewalls inand reduce costs. It also alters an order guarantee safety of informationorganization’s overall computer and blocking of unwarranted access tosecurity risk profile. Although it is a given computer. The use of firewallimpossible to totally eradicate or threat countermeasures should beeliminate all risks associated with considered in every Local Areawireless network, but is possible to Network (LAN) and Wide Areaachieve a reasonable degree of overall Network (WAN) infrastructure so thatsecurity by adopting firewall network security issues would becountermeasures techniques. Firewalls solved to a certain reasonable level.8.0 References threats and countermeasures. International Journal of Multimedia[1] Choi, M. K., Robles, R. J., Hong, and Ubiquitous Engineering, 3(3), 1-3.C. H., & Kim, T. H. (2008). Wireless Retrieved from http://www.sersc.orgnetwork security: Vulnerabilities,Firewall Countermeasures Edwin 2013
  10. 10. 10 | P a g e[2] Makki, S. K., Reiher , P., Makki , [4] Pandey, S. (2011). Modern networkK., Pissinou , N., & Makki, S. (2007). security: Issues and challenges.Mobile and wireless network security International Journal of Engineeringand privacy. (1 ed., Vol. 1, p. 6). New Science and Technology, 3(5), 1-7.York: Springer US. Retrieved from Retrieved from http://www.ijest.info/http://www.springer.com [5] Wang, H. (2004). Network firewall. 1(1), 1-[3] Sunday, N. A. (2008). Wireless 7. Retrieved from http://www.learningace.com/local area network (wlan): Security riskassessment and countermeasures . 1(1),3. Retrieved from http://www.bth.seFirewall Countermeasures Edwin 2013