Wireless access act as rouge access points. It is

Wireless SecurityA survey of Wireless Security done by “JOSEPH ANTONY PRAKASH LAZAR” Abstract:In recent years, Wireless has become the new trend in the I.T field. Wireless networks are common and are a part of every organization or an individual. Since it is so important and is part of life, the security is a key issue to be addressed. This survey talks about various difficulties in this field of “Wireless Security” and the advancement in this field. In this paper, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network. The various techniques and trends in use with the goal of promoting discussions and collaborations. However, providing satisfactory security protection in wireless sensor networks has ever been a challenging task due to various network and resource constraints and malicious attacks.Email ID: [email protected] Name: Network and Systems SecurityCourse Number: AIT 682Instructor’s Name: Dr. Kun SunKeywords: Security, Wireless, Networks, Protocols, Wireless Threats.SummaryWireless security deals with the prevention of unauthorized access or damage to computers or machinery using wireless networks. There are two most common widely used security standards WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). WEP is a notoriously weak security standard. The password it uses could be easily cracked with a basic laptop computer and widely available software tools. WPA was alternative to improve security; current standard is WPA-2. It sues an encryption device that encrypts the network with a 256-bit key; the longer key length better the security.The research papers used in this survey talks about the various threats and situations that could potentially make certain wireless access act as rouge access points. It is also seen that most threat background are due to rouge access points rather than breaches due to internal exploits of various LAN/WLAN setups. Wireless networks are one of the most common technologies, both for organizations and individuals. Hackers have found wireless networks relatively easy to break into, and even use wireless technology to hack into wired networks. One popular technique we would see is that use of WIP (Wireless Intrusion Prevention) and WID (Wireless Intrusion Detection) systems to enforce strong security policies. The paper also provides a survey of the existing security protocols and algorithms that are used in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systemsWe would see the various modes of unauthorized access to wireless networks. Covert Wireless communication. WIPS concepts and its implementation. Various Security measures like SSIDhiding, MACID filtering, 802.11 security, End to end encryption, WAPI, RF shielding, DOS defense techniques.Reasons for Wireless Security Survey:Today, most modern networks consist of a diverse range of computing devices from Ethernet-only desktop computers to Wi-Fi enabled mobile devices, such as tablets and smartphones. When we talk about network security, security risks associated with routers is a major concern among users. A router, whether it is wired or wireless, is an integral part of any home or business network. If it is not configured properly, both of them could pose potential security risks. Anyone within the geographical network range of an open, unencrypted wireless network can “sniff”, or capture and record, the traffic, gain unauthorized access to internal network resources as well as to the internet, and then use the information and resources to perform disruptive or illegal acts. Such security breaches have become important concerns for both enterprise and home networks. Wireless security has become such an important aspect that one needs to know the current-status and the trending techniques to safeguard their wireless activities and be aware of the threats that lurks on a day-to-day basis.Classification of the techniques:As mentioned in the summary, the various techniques that are being covered are classified into prevention methods and defense methods. The following are the list of techniques classification that would be covered in the following survey paper. Firstly the mode of access, various modes of unauthorized access. Then we talk about the various security measure to defend against the knowattacks like the ones mentioned in the summary. We talk about prevention acts in respect to WIP (Wireless Intrusion Prevention Systems) and covert wireless communication.Various Techniques of each Reference:The defensive part of the attacks, mentioned in the summary, attacks as in Malicious association 4, Ad-hoc networks 4, MAC ID Spoofing other MAC ID related threats 4, DOS, MITM, Network Injection 4,3. Techniques regarding internal architecture of protocols and communication modes safety methods is covered in this 1. The encryption of networks and various protocol techniques for improved security is covered in this 2. The various types of technology in use for security and best practice methodology is referred here 5. The IEE 802 various standards and techniques for each standards is covered in this 6. The rest of the research papers used for survey were references used in the above-mentioned papers, for detailed survey on particular topics.Wireless Security Trends:Wi-Fi is proliferating at very fast pace. The convenience of wireless access, low cost, and plug-and-play feature of the technology have been the major drivers for Wi-Fi’s popularity among home Internet users. Lately we are also seeing an increasing adoption of Wi-Fi in the enterprise. Based on articles and reports over the web, there are six network and security technology predictions that are trending now and would be probable in the future. Evolution of Malware: Malware has been the most effective way for attackers to reach targets globally. One trend that is appearing is the emergence of memory-resident malware. These infections will not survive a reboot and be particularly difficult to detect forensically, but as more people leave their computers continuously running, this may be a successful attack technique. It always stands mostly as theinitial breach of any security. IoT complexity leads to security issues and DDoS attacks: The IoT world has the problem of having a wide variety of protocols and standards, enterprises that lack skills with IoT systems, overly complex architectures, and products with weak security features, weak security measures and operational immaturity. We have already seen immense DDoS attacks sourced from vulnerable IoT devices, and to predict even more in 2018 is an obvious statement. Cloud Security : In recent years, there have been several publicized cloud security breaches, and many organizations still use security as a roadblock, prevent their organizations from taking advantage of the benefits of cloud computing. For those organizations operating in the cloud, there are best practices and guidelines to audit their deployments. There are also cloud security certifications such as the Cloud Security Alliance’s (CSA) Certificate of Cloud Security Knowledge (CCSK) and the (ISC) 2 Certified Cloud Security Practitioner (CCSP). Applying AI and machine learning to security: In the modern world of threat intelligence feeds and hybrid-IT environments, the activity of security monitoring and management has surpassed human capability. There are now many security vendors and service providers that advertise features such as A.I, machine learning, and deep learning and data visualization to help enterprises recognize and respond to attacks. Recently, IBM Watson lent its vast capabilities to the world of cybersecurity. IPv6 traffic exponential rise: The global internet’s progress on IPv6 deployment has been slow but steady in recent years. Most ISP, broadband internet providers, and mobile operators have deployed IPv6. People are now likely to have IPv6 running on the mobile device in their pocket and at their homes. What we are seeing is that IPv6 is accelerating as IPv4 is nearing its peak. We can expect IPv6 adoption to continue to rise. However, in a couple of years, that adoption rate will start to slow as it reaches 50 percent of the internet’s total traffic.References:


I'm Neil!

Would you like to get a custom essay? How about receiving a customized one?

Check it out