Call for Paper - September 2022 Edition
IJCA solicits original research papers for the September 2022 Edition. Last date of manuscript submission is August 22, 2022. Read More

Network Security Vulnerabilities Heading for Malicious Attack

Print
PDF
IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012
© 2012 by IJCA Journal
CTNGC - Number 3
Year of Publication: 2012
Authors:
Mohd. Izhar
Mohd. Shahid
V. R. Singh

Mohd. Izhar, Mohd. Shahid and V.r.singh. Article: Network Security Vulnerabilities Heading for Malicious Attack. IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012 CTNGC(3):17-22, November 2012. Full text available. BibTeX

@article{key:article,
	author = {Mohd. Izhar and Mohd. Shahid and V.r.singh},
	title = {Article: Network Security Vulnerabilities Heading for Malicious Attack},
	journal = {IJCA Proceedings on National Conference on Communication Technologies & its impact on Next Generation Computing 2012},
	year = {2012},
	volume = {CTNGC},
	number = {3},
	pages = {17-22},
	month = {November},
	note = {Full text available}
}

Abstract

An organization requires that WLAN must address three critical areas: Data Confidentiality and Integrity, Authentication and Access Control and Intrusion Detection and Prevention. By the growth of Wireless Network, so many security threats have also been raised that does not require much expertise and expensive equipment to launch an attack against an organization. Such attacks are initiated from inside or outside at a great distance using readily available standard wireless equipment. These days the WLAN system is migrating from Pre-RSNA methods of Security to the RSNA and using WPA/WPA2 with AES encryption, in conjunction with 802. 1x authentication for providing a security to WLANs and at the same time wireless intrusion detection and prevention systems are being made more capable and easier to manage but still wireless security solution in place are vulnerable to malicious attacks and need to be kept reviewed as per standard of IEEE as well of Wi-Fi Alliance and beyond it. WLAN vendors and researchers look into it and try to ensure the solution to the problem. MAC address spoofing refers to the getting the MAC address of other network card and using it on the network for misrepresentation and illegitimate use. This paper helps the community at large in knowing several security tools. These tools scan whole network and provide various information of node(s) within the node to the malicious node (attacker), the node which intend to attack the network and spoof MAC address and breaches the security. This MAC address is continuously sent over at Wi-Fi networks, even if they use secure WEP/WPA Encryption. The node with fake MAC address masquerade as an authorized wireless access point or as an authorized client. Such node launches denial of service attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.

References

  • Turkan Ahamad & Manar Younis, IJCA (0975 – 888), Volume 48– No. 16, June 2012. The Enhancement of Routing Security in Mobile Ad-hoc Networks.
  • Payal Pahwa, Gaurav Tiwari, Rashmi Chhabra, IJAEA, Jan. 2010. Spoofing Media Access Control (MAC) and its Counter Measures.
  • Farhad Soleimanian & Zeinab Abbasi, IJCA(0975 – 888), Volume 47– No. 22, June 2012. Analysis and Evaluation of Dynamic Load Balancing in IEEE 802. 11b Wireless Local Area.
  • Joshua Wright, 2003. Detecting Wireless LAN MAC Address Spoofing.
  • Fanglu Guo and Tzi-cker Chiueh, 2005. Sequence Number-Based MAC Address Spoof Detection.
  • Stuart Compton, SANS Institute, May 2007. 802. 11 Denial of Service Attacks and Mitigation.
  • D. Gupta, G. Tiwari,Y. K and P. Kumar, IJRTE 2009. Media Access Control (MAC) MAC spoofing and its countermeasures.
  • Siemens Enterprise Communications, July 2008. WLAN Security Today: Wireless more Secure than Wired, white paper.
  • George Ou, Jan 3, 2005. Wireless LAN security guide.
  • Website, http://www. technitium. com/
  • Website, http://www. klcconsulting. net/smac.
  • Website, http://www. softpedia. com/ get/ Network-Tools/ IP-Tools/ IPScan-II. shtml
  • Website, http://ip-scan. qarchive. org/, May 2012
  • Website, ww. radmin. com/products/ipscanner/, May 2012
  • Website, http://www. angryip. org/w/Home, May 2012
  • Website, http://www. opnet. com/itguru-academic
  • Richa Bansal, Siddharth Tiwari, Divya Bansal, ICON 2008: 1-6. Non-cryptographic methods of MAC spoof detection in wireless LAN.
  • Guenther Lackner, Udo Payer, and Peter Teu, January 20, 2009. Combating Wireless LAN MAC-Layer Address Spoofing with Fingerprinting Methods.
  • Hassene Bouhouche & Sihem Guemara, IJCA (0975 – 8887), Volume 6– No. 3, September 2010. A QoS-based Resources Reservation Mechanism for Ad Hoc Networks.
  • IEEE Std 802. 11™-2007, Revision of IEEE Std 802. 11-1999, IEEE 3 Park Avenue New York, NY 10016-5997, USA 12 June 2007.
  • IEEE Std. 2009 Revision of IEEE Std 802. 11™-2007, 30 sept. 2009.
  • IEEE Std 802. 11i-2004, Amendment to IEEE Std 802. 11™, 1999 Edition (Reaff 2003) as amended by IEEE Stds 802. 11a™-1999, 802. 11b™-1999,802. 11b™-1999/Cor 1-2001, 802. 11d™-2001, 802. 11g-2003, and 802. 11h-2003] Amendment 6: Medium Access Control (MAC) Security Enhancements, 23 July 2004.