Security of the Network

Download Report

Transcript Security of the Network

Security of the Network

Wireless Security Risks • Why is it easy to hack a wireless network?

• How to detect and hack a wireless network?

• What do successful hackers do?

• Network Intrusion Detection and Protection.

Why is it easy to hack a wireless network?

• There is no physical boundary to a wireless network.

• Due to bugs in the protocol implementation used for wireless networks.

How to detect and hack a wireless network?

• War Driving • Rogue Access Point • WEP Key Cracking

What do successful hackers do?

• Active Hackers Risks • Confidentiality • • Integrity Availability • Passive Hackers • • Interested in data Don’t harm the network

Network Intrusion Detection and Protection • Network based • Packet Sniffers • Signature Detectors • Host based • Use of Honey Pots (sand box) • Use of Firewalls/NAT/VPN

Secure WLAN Architecture • • • • Protocol Introduction Security Model Architecture of the proposed system Drawbacks of the model

Protocol Introduction • We use VPN/IPSec/TKIP Protocols

Security Model • Contains two phases 1.

Designing and implementing a secure system 2.

Educating the users about security

Architecture description • • • • Mac-address filtering Password based security Assignment of client IP addresses Use of VPN/Firewall

Architecture Diagram

Authorize id LAN Switch

INTERNET ID/Pass??

Private N/W

I’m MAC X

END