SlideShare a Scribd company logo
Wireless LAN Security
Kasturi Chakraborty
Shreosi Maitra
Suvadip Banerjee
Upasona Roy
Presented by
CONTENTS
 Introduction
 Wireless LAN Technology Options
 Types of Wireless LANs
 Basic Configuration
 Standards
 Advantages and Disadvantages
 Security issues and Solutions
Introduction
 Wireless LAN is a flexible communication system
implemented as an extension to a wired LAN, using
electromagnetic waves to transmit and receive data over
air, minimizing the need for wired connections.
 It is a communication network that provides connectivity to
wireless devices within a limited geographic area such as
home, school, single office, building or campus.
 "Wi-Fi" is the universal standard for wireless networks and is the
wireless equivalent of wired Ethernet networks.
Wireless LAN Technology Options
o Narrowband Technology
o Spread Spectrum Technology
o Frequency-Hopping Spread Spectrum Technology
o Direct Sequence Spread Spectrum Technology
o Infrared Technology
Basic Configuration
Types of Wireless LANs
Standards
1) IEEE 802.11
2) IEEE 802.11b
3) IEEE 802.11a
4) IEEE 802.11g
5) IEEE 802.11n
6) IEEE 802.11ac
Advantages
Key drivers are mobility and
accessibility.
Increased Productivity.
Improved collaboration.
No need to reconnect to the network.
Flexible installation and scalability.
Disadvantages
Very expensive.
Signal bleed over.
Environmental conditions.
Less capacity.
Is it Secure?
 Someone can block the entire radio communication
channel by transmitting junk on certain frequencies and
anonymously stage a denial of service attack from your
network.
 Anybody can plant viruses on our system.
 The webpages can be changed.
 As the number of WLAN cards grows so will the
opportunities for hackers to break into the wireless
networks.
 Regardless of the technology used , WLAN security will
always be limited because users will sidestep security
features.
Security Issues & Solutions
 War Driving
 Eavesdropping
 Denial of Service Attack
 Rogue Access Points
War Driving(Access Point
Mapping)
 It is the act of locating and possibly exploiting connections to
wireless local area networks while driving around a city or
elsewhere using a portable computer, smartphone or personal
digital assistant (PDA).
 Wireless NIC scans for wireless access points . The computer looks
for SSID (wireless network name) which is being constantly
transmitted by the access point , letting the computers know of its
presence.
 The wiredriver uses software like NetStumbler (Windows) or
Kismet (Linux) to scan the airwaves for SSIDS.
 The wiredriver generally configures his/her software to log any
strong unencrypted signal using GPS receiver and connect to the
access point.
Basic Configuration of War Driving
Solution for War Driving
o Do not broadcast your SSID.
o Change the default password.
o Encrypt your wireless connection using the encryption
schemes.
o Filter the MAC addresses that are allowed to connect to
your router.
o If you configure file sharing on your computer, make sure
it is password protected.
o Use personal firewall software.
Eavesdropping
 In wireless sensor networks ,any wireless network residing in the transmission
range of the transmitter can potentially decode the signal when both the
transmitter and receiver are unaware of the reconnaissance.
 This involves attacks against the confidentiality of the data that is being
transmitted across the network.
There are two types of eavesdropping:
I. Passive Eavesdropping: The malicious nodes detect the information by
listening to the message transmission in the wireless broadcasting medium.
II. Active Eavesdropping: The malicious nodes actively grab the information via
sending queries to transmitters by disguising themselves as friendly nodes.
Solution for Eavesdropping
o The best way to keep your traffic secure while on Wi-Fi
hotspots is to connect to a Virtual Private Network (VPN),
maybe to your work’s network, a server you set up at your
home, or a hosted service designed specifically for
hotspot security, such as Private Wifi or Hotspot Shield.
o We must make sure any services or sites you use while on
the hotspot are secured with SSL encryption.
o The Enterprise mode of WPA2 security (also called the
802.1X or EAP mode) requires an authentication server,
commonly called a Remote Authentication Dial In User
Service (RADIUS) which prevents users from reading each
other’s traffic.
Denial of Service Attack
 A denial of service (DoS) attack is an assault that can
cripple or disable a WLAN. It can slow the network to
crawling speeds or actually force it to quit working.
 One form of DoS attack is the "brute force" method. This
can come in one of two forms:
I. A huge flood of packets that uses up all of the network's
resources and forces it to shut down.
II. A very strong radio signal that totally dominates the
airwaves and renders access points and radio cards
useless.
Solution for Denial of Service
Attack
This type of attack can be prevented by:
o implementing and updating firewalls.
o maintaining updated virus protection.
o ensuring strong passwords and deploy DoS detection tools,
such as AirDefense and AirMagnet in addition.
o You can protect a WLAN against DoS attacks by making the
building as resistive as possible to incoming radio signals.
Rogue Access Points
 Rogue APs can be APs that are connected to the enterprise wired LAN
without authorization or APs that are not connected to the wired LAN
but that accept associations from clients.
 Rogue APs can even be APs with a wireless card and a special
software package that makes them act as an AP.
Types of Rogue Aps based on security categories:
I. Non-malicious APs: The majority of the cases consist of someone
installing a rogue AP with the intent being not to bypass the
corporation's security policy but to deploy wireless as a convenience
or productivity enhancer.
II. Malicious Aps: the attacker sets up the AP to gain access to the wired
network or to disrupt the performance of the WLAN.
Rogue AP Detection
Prevention of Rogue APs
o Use of commercial tools like AirMagnet and AirDefence to
scan for rogue Aps periodically and verify their legitimacy.
o Using network Wireless Intrusion Prevention System (WIPS)
to watch the air or by using a host-resident Wireless IPS to
monitor client activity.
o Use of WLAN analyzer for Rogue AP detection.
o Smaller businesses on more limited budgets may prefer to
install stand-alone host WIPS programs like Sana Security
Primary Response Air Cover.
Wlan security

More Related Content

What's hot

Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
RanjitUpadhyay4
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
Prakashchand Suthar
 
WLAN
WLANWLAN
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
kentquirk
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
Paul Gillingwater, MBA
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
Fathima Rahaman
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
Agris Ameriks
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Muhammad Farooq Hussain
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
Dr Shashikant Athawale
 
Brief introduction to satellite communications
Brief introduction to satellite communicationsBrief introduction to satellite communications
Brief introduction to satellite communications
Sally Sheridan
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
SANJUU7
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
Richa Kumari
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
Md Waresul Islam
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Parthipan Parthi
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
juno susi
 

What's hot (20)

Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
WiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & DefenceWiFi Secuiry: Attack & Defence
WiFi Secuiry: Attack & Defence
 
WLAN
WLANWLAN
WLAN
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Wireless Network security
Wireless Network securityWireless Network security
Wireless Network security
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Brief introduction to satellite communications
Brief introduction to satellite communicationsBrief introduction to satellite communications
Brief introduction to satellite communications
 
Wireless local loop
Wireless local loopWireless local loop
Wireless local loop
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Viewers also liked

Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In Depth
Tũi Wichets
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
Michal Jarski
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
Pradeep Kumar TS
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connectionsguest85e156e
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
VIKAS SINGH BHADOURIA
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
Anshuman Biswal
 

Viewers also liked (7)

Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In Depth
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
How To Hack Wireless Internet Connections
How To Hack Wireless Internet ConnectionsHow To Hack Wireless Internet Connections
How To Hack Wireless Internet Connections
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Wireless Networking Security
Wireless Networking SecurityWireless Networking Security
Wireless Networking Security
 

Similar to Wlan security

Wireless Security
Wireless SecurityWireless Security
Wireless Security
Vignesh Suresh
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Philippine Association of Academic/Research Librarians
 
Wireless security report
Wireless security reportWireless security report
Wireless security reportMarynol Cahinde
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
Michael Boman
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
Zaibi Gondal
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogythasnim1304
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...Lindsey Landolfi
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
kataria Arvind
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Securityphanleson
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
adolphoyonker
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 
Wi Fi
Wi FiWi Fi
Wireless security
Wireless securityWireless security
Wireless security
Aurobindo Nayak
 

Similar to Wlan security (20)

Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Wireless security report
Wireless security reportWireless security report
Wireless security report
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Wi fi technology
Wi fi technologyWi fi technology
Wi fi technology
 
Wirless Security By Zohaib Zeeshan
Wirless Security By Zohaib ZeeshanWirless Security By Zohaib Zeeshan
Wirless Security By Zohaib Zeeshan
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...The Risks and Security Standards of WLAN Technologies:  Bluetooth and Wireles...
The Risks and Security Standards of WLAN Technologies: Bluetooth and Wireles...
 
Wi-Fi Tecnology
Wi-Fi TecnologyWi-Fi Tecnology
Wi-Fi Tecnology
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Ch20 Wireless Security
Ch20 Wireless SecurityCh20 Wireless Security
Ch20 Wireless Security
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wireless security
Wireless securityWireless security
Wireless security
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 

Recently uploaded (16)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 

Wlan security

  • 1. Wireless LAN Security Kasturi Chakraborty Shreosi Maitra Suvadip Banerjee Upasona Roy Presented by
  • 2. CONTENTS  Introduction  Wireless LAN Technology Options  Types of Wireless LANs  Basic Configuration  Standards  Advantages and Disadvantages  Security issues and Solutions
  • 3. Introduction  Wireless LAN is a flexible communication system implemented as an extension to a wired LAN, using electromagnetic waves to transmit and receive data over air, minimizing the need for wired connections.  It is a communication network that provides connectivity to wireless devices within a limited geographic area such as home, school, single office, building or campus.  "Wi-Fi" is the universal standard for wireless networks and is the wireless equivalent of wired Ethernet networks.
  • 4. Wireless LAN Technology Options o Narrowband Technology o Spread Spectrum Technology o Frequency-Hopping Spread Spectrum Technology o Direct Sequence Spread Spectrum Technology o Infrared Technology
  • 7. Standards 1) IEEE 802.11 2) IEEE 802.11b 3) IEEE 802.11a 4) IEEE 802.11g 5) IEEE 802.11n 6) IEEE 802.11ac
  • 8. Advantages Key drivers are mobility and accessibility. Increased Productivity. Improved collaboration. No need to reconnect to the network. Flexible installation and scalability.
  • 9. Disadvantages Very expensive. Signal bleed over. Environmental conditions. Less capacity.
  • 10. Is it Secure?  Someone can block the entire radio communication channel by transmitting junk on certain frequencies and anonymously stage a denial of service attack from your network.  Anybody can plant viruses on our system.  The webpages can be changed.  As the number of WLAN cards grows so will the opportunities for hackers to break into the wireless networks.  Regardless of the technology used , WLAN security will always be limited because users will sidestep security features.
  • 11. Security Issues & Solutions  War Driving  Eavesdropping  Denial of Service Attack  Rogue Access Points
  • 12. War Driving(Access Point Mapping)  It is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere using a portable computer, smartphone or personal digital assistant (PDA).  Wireless NIC scans for wireless access points . The computer looks for SSID (wireless network name) which is being constantly transmitted by the access point , letting the computers know of its presence.  The wiredriver uses software like NetStumbler (Windows) or Kismet (Linux) to scan the airwaves for SSIDS.  The wiredriver generally configures his/her software to log any strong unencrypted signal using GPS receiver and connect to the access point.
  • 13. Basic Configuration of War Driving
  • 14. Solution for War Driving o Do not broadcast your SSID. o Change the default password. o Encrypt your wireless connection using the encryption schemes. o Filter the MAC addresses that are allowed to connect to your router. o If you configure file sharing on your computer, make sure it is password protected. o Use personal firewall software.
  • 15. Eavesdropping  In wireless sensor networks ,any wireless network residing in the transmission range of the transmitter can potentially decode the signal when both the transmitter and receiver are unaware of the reconnaissance.  This involves attacks against the confidentiality of the data that is being transmitted across the network. There are two types of eavesdropping: I. Passive Eavesdropping: The malicious nodes detect the information by listening to the message transmission in the wireless broadcasting medium. II. Active Eavesdropping: The malicious nodes actively grab the information via sending queries to transmitters by disguising themselves as friendly nodes.
  • 16. Solution for Eavesdropping o The best way to keep your traffic secure while on Wi-Fi hotspots is to connect to a Virtual Private Network (VPN), maybe to your work’s network, a server you set up at your home, or a hosted service designed specifically for hotspot security, such as Private Wifi or Hotspot Shield. o We must make sure any services or sites you use while on the hotspot are secured with SSL encryption. o The Enterprise mode of WPA2 security (also called the 802.1X or EAP mode) requires an authentication server, commonly called a Remote Authentication Dial In User Service (RADIUS) which prevents users from reading each other’s traffic.
  • 17. Denial of Service Attack  A denial of service (DoS) attack is an assault that can cripple or disable a WLAN. It can slow the network to crawling speeds or actually force it to quit working.  One form of DoS attack is the "brute force" method. This can come in one of two forms: I. A huge flood of packets that uses up all of the network's resources and forces it to shut down. II. A very strong radio signal that totally dominates the airwaves and renders access points and radio cards useless.
  • 18.
  • 19. Solution for Denial of Service Attack This type of attack can be prevented by: o implementing and updating firewalls. o maintaining updated virus protection. o ensuring strong passwords and deploy DoS detection tools, such as AirDefense and AirMagnet in addition. o You can protect a WLAN against DoS attacks by making the building as resistive as possible to incoming radio signals.
  • 20. Rogue Access Points  Rogue APs can be APs that are connected to the enterprise wired LAN without authorization or APs that are not connected to the wired LAN but that accept associations from clients.  Rogue APs can even be APs with a wireless card and a special software package that makes them act as an AP. Types of Rogue Aps based on security categories: I. Non-malicious APs: The majority of the cases consist of someone installing a rogue AP with the intent being not to bypass the corporation's security policy but to deploy wireless as a convenience or productivity enhancer. II. Malicious Aps: the attacker sets up the AP to gain access to the wired network or to disrupt the performance of the WLAN.
  • 22. Prevention of Rogue APs o Use of commercial tools like AirMagnet and AirDefence to scan for rogue Aps periodically and verify their legitimacy. o Using network Wireless Intrusion Prevention System (WIPS) to watch the air or by using a host-resident Wireless IPS to monitor client activity. o Use of WLAN analyzer for Rogue AP detection. o Smaller businesses on more limited budgets may prefer to install stand-alone host WIPS programs like Sana Security Primary Response Air Cover.

Editor's Notes

  1. To be explained by the presenter(each & every LAN technology