Transcript Security of the Network
Security of the Network
Wireless Security Risks • Why is it easy to hack a wireless network?
• How to detect and hack a wireless network?
• What do successful hackers do?
• Network Intrusion Detection and Protection.
Why is it easy to hack a wireless network?
• There is no physical boundary to a wireless network.
• Due to bugs in the protocol implementation used for wireless networks.
How to detect and hack a wireless network?
• War Driving • Rogue Access Point • WEP Key Cracking
What do successful hackers do?
• Active Hackers Risks • Confidentiality • • Integrity Availability • Passive Hackers • • Interested in data Don’t harm the network
Network Intrusion Detection and Protection • Network based • Packet Sniffers • Signature Detectors • Host based • Use of Honey Pots (sand box) • Use of Firewalls/NAT/VPN
Secure WLAN Architecture • • • • Protocol Introduction Security Model Architecture of the proposed system Drawbacks of the model
Protocol Introduction • We use VPN/IPSec/TKIP Protocols
Security Model • Contains two phases 1.
Designing and implementing a secure system 2.
Educating the users about security
Architecture description • • • • Mac-address filtering Password based security Assignment of client IP addresses Use of VPN/Firewall
Architecture Diagram
Authorize id LAN Switch
INTERNET ID/Pass??
Private N/W
I’m MAC X
END