CFP last date
22 April 2024
Reseach Article

Network Security Vulnerabilities Heading for Malicious Attack

Published on November 2012 by Mohd. Izhar, Mohd. Shahid, V.r.singh
National Conference on Communication Technologies & its impact on Next Generation Computing 2012
Foundation of Computer Science USA
CTNGC - Number 3
November 2012
Authors: Mohd. Izhar, Mohd. Shahid, V.r.singh
134b6cf7-b26d-45b9-89ec-bb994c085b80

Mohd. Izhar, Mohd. Shahid, V.r.singh . Network Security Vulnerabilities Heading for Malicious Attack. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 3 (November 2012), 17-22.

@article{
author = { Mohd. Izhar, Mohd. Shahid, V.r.singh },
title = { Network Security Vulnerabilities Heading for Malicious Attack },
journal = { National Conference on Communication Technologies & its impact on Next Generation Computing 2012 },
issue_date = { November 2012 },
volume = { CTNGC },
number = { 3 },
month = { November },
year = { 2012 },
issn = 0975-8887,
pages = { 17-22 },
numpages = 6,
url = { /proceedings/ctngc/number3/9065-1029/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%A Mohd. Izhar
%A Mohd. Shahid
%A V.r.singh
%T Network Security Vulnerabilities Heading for Malicious Attack
%J National Conference on Communication Technologies & its impact on Next Generation Computing 2012
%@ 0975-8887
%V CTNGC
%N 3
%P 17-22
%D 2012
%I International Journal of Computer Applications
Abstract

An organization requires that WLAN must address three critical areas: Data Confidentiality and Integrity, Authentication and Access Control and Intrusion Detection and Prevention. By the growth of Wireless Network, so many security threats have also been raised that does not require much expertise and expensive equipment to launch an attack against an organization. Such attacks are initiated from inside or outside at a great distance using readily available standard wireless equipment. These days the WLAN system is migrating from Pre-RSNA methods of Security to the RSNA and using WPA/WPA2 with AES encryption, in conjunction with 802. 1x authentication for providing a security to WLANs and at the same time wireless intrusion detection and prevention systems are being made more capable and easier to manage but still wireless security solution in place are vulnerable to malicious attacks and need to be kept reviewed as per standard of IEEE as well of Wi-Fi Alliance and beyond it. WLAN vendors and researchers look into it and try to ensure the solution to the problem. MAC address spoofing refers to the getting the MAC address of other network card and using it on the network for misrepresentation and illegitimate use. This paper helps the community at large in knowing several security tools. These tools scan whole network and provide various information of node(s) within the node to the malicious node (attacker), the node which intend to attack the network and spoof MAC address and breaches the security. This MAC address is continuously sent over at Wi-Fi networks, even if they use secure WEP/WPA Encryption. The node with fake MAC address masquerade as an authorized wireless access point or as an authorized client. Such node launches denial of service attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.

References
  1. Turkan Ahamad & Manar Younis, IJCA (0975 – 888), Volume 48– No. 16, June 2012. The Enhancement of Routing Security in Mobile Ad-hoc Networks.
  2. Payal Pahwa, Gaurav Tiwari, Rashmi Chhabra, IJAEA, Jan. 2010. Spoofing Media Access Control (MAC) and its Counter Measures.
  3. Farhad Soleimanian & Zeinab Abbasi, IJCA(0975 – 888), Volume 47– No. 22, June 2012. Analysis and Evaluation of Dynamic Load Balancing in IEEE 802. 11b Wireless Local Area.
  4. Joshua Wright, 2003. Detecting Wireless LAN MAC Address Spoofing.
  5. Fanglu Guo and Tzi-cker Chiueh, 2005. Sequence Number-Based MAC Address Spoof Detection.
  6. Stuart Compton, SANS Institute, May 2007. 802. 11 Denial of Service Attacks and Mitigation.
  7. D. Gupta, G. Tiwari,Y. K and P. Kumar, IJRTE 2009. Media Access Control (MAC) MAC spoofing and its countermeasures.
  8. Siemens Enterprise Communications, July 2008. WLAN Security Today: Wireless more Secure than Wired, white paper.
  9. George Ou, Jan 3, 2005. Wireless LAN security guide.
  10. Website, http://www. technitium. com/
  11. Website, http://www. klcconsulting. net/smac.
  12. Website, http://www. softpedia. com/ get/ Network-Tools/ IP-Tools/ IPScan-II. shtml
  13. Website, http://ip-scan. qarchive. org/, May 2012
  14. Website, ww. radmin. com/products/ipscanner/, May 2012
  15. Website, http://www. angryip. org/w/Home, May 2012
  16. Website, http://www. opnet. com/itguru-academic
  17. Richa Bansal, Siddharth Tiwari, Divya Bansal, ICON 2008: 1-6. Non-cryptographic methods of MAC spoof detection in wireless LAN.
  18. Guenther Lackner, Udo Payer, and Peter Teu, January 20, 2009. Combating Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods.
  19. Hassene Bouhouche & Sihem Guemara, IJCA (0975 – 8887), Volume 6– No. 3, September 2010. A QoS-based Resources Reservation Mechanism for Ad Hoc Networks.
  20. IEEE Std 802. 11™-2007, Revision of IEEE Std 802. 11-1999, IEEE 3 Park Avenue New York, NY 10016-5997, USA 12 June 2007.
  21. IEEE Std. 2009 Revision of IEEE Std 802. 11™-2007, 30 sept. 2009.
  22. IEEE Std 802. 11i-2004, Amendment to IEEE Std 802. 11™, 1999 Edition (Reaff 2003) as amended by IEEE Stds 802. 11a™-1999, 802. 11b™-1999,802. 11b™-1999/Cor 1-2001, 802. 11d™-2001, 802. 11g-2003, and 802. 11h-2003] Amendment 6: Medium Access Control (MAC) Security Enhancements, 23 July 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Rsna (robust Security Network Association) Wpa (wireless Protected Access) Carrier Sense Multiple Access/collision Avoidance(csma/ca) Counter Mode With Cipher-block Chaining Message Authentication Code Protocol (ccmp) Temporal Key Integrity Protocol(tkip) Confidentiality Wireless Local Area Network(wlan) Local Area Network Medium Access Controller(mac) And Physical (phy)