Wireless Intrusion Detection Technologies to Determine Friend or Foe
نویسندگان
چکیده
Wireless Local Area Networks (WLANs) allow devices to connect with a useable amount of bandwidth without being networked via a physical connection. Laptop users within range of the WLAN could connect anywhere and be granted instant access to all networking resources. WLANs, which exist over radio waves, have no physical structure and are therefore more vulnerable to tampering. Therefore, security in the WLANs has come under intense scrutiny. Though wireless networks have seen widespread acceptance in the home user markets, widely reported and easily exploited vulnerabilities in the wireless security system have decreased wireless' deployment rate in enterprise environments. While many people don't know exactly what the weaknesses are, most have blindly accepted that wireless networks are inherently insecure and nothing can be done to improve the security level. But this is not true. It is recommended to do the basic effort before coming to a conclusion. This paper addresses the importance of monitoring the wireless networks, and demonstrates how intrusion prevention technology secures the WLANs. Through this paper, we have made an attempt to analyze and asses the performance of some of the wireless intrusion detection tools (Airsnare, Airopeek NX, and AirPatrol Mobile), describe the pros and cons of these tools, and analyze how the network’s security level varies with the deployment of these tools. The paper seeks to assist home/enterprise networks in reducing the risks associated with 802.11 wireless local area networks.
منابع مشابه
Kant: Friend or Foe of the Believer? Plantinga and Other American Christian Responses to Kant's Epistemology
متن کامل
Intrusion Detection in Wireless Sensor Networks using Genetic Algorithm
Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...
متن کاملA New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملCyberspace Security Using Adversarial Learning and Conformal Prediction
This paper advances new directions for cyber security using adversarial learning and conformal prediction in order to enhance network and computing services defenses against adaptive, malicious, persistent, and tactical offensive threats. Conformal prediction is the principled and unified adaptive and learning framework used to design, develop, and deploy a multi-faceted self-managing defensive...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کامل