CFP last date
20 May 2024
Reseach Article

Providing Data Security in WLAN

Published on August 2012 by Sunil Shirsat, Swapnil Sanap
International Conference on Intuitive Systems and Solutions 2012
Foundation of Computer Science USA
ICISS - Number 1
August 2012
Authors: Sunil Shirsat, Swapnil Sanap
860aa493-4364-4012-a6cc-a5eceab269d4

Sunil Shirsat, Swapnil Sanap . Providing Data Security in WLAN. International Conference on Intuitive Systems and Solutions 2012. ICISS, 1 (August 2012), 6-10.

@article{
author = { Sunil Shirsat, Swapnil Sanap },
title = { Providing Data Security in WLAN },
journal = { International Conference on Intuitive Systems and Solutions 2012 },
issue_date = { August 2012 },
volume = { ICISS },
number = { 1 },
month = { August },
year = { 2012 },
issn = 0975-8887,
pages = { 6-10 },
numpages = 5,
url = { /proceedings/iciss/number1/7950-1002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Intuitive Systems and Solutions 2012
%A Sunil Shirsat
%A Swapnil Sanap
%T Providing Data Security in WLAN
%J International Conference on Intuitive Systems and Solutions 2012
%@ 0975-8887
%V ICISS
%N 1
%P 6-10
%D 2012
%I International Journal of Computer Applications
Abstract

Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing data in WLAN it is necessary to detect unauthorized access points which are installed without explicit authorization from a local network management. Rogue APs potentially open up the network to unauthorized parties, who may utilize the resources of the network, steal sensitive information or even launch attacks to the network. This has forced the develop systems that will not only detect the unauthorized access points but also detect network attacks performed by authorized or unauthorized access points so that it protects data from external misuse. In network attacks, the hackers try to break the security of the network, by affecting host and then proceeding towards further damage. Due to the above security and performance threats, detecting unauthorized APs as well as detecting attacks performed by unauthorized or authorized AP'S is one of the most important tasks for a network manager.

References
  1. Wei Wei, Kyoungwon Suh, Bing Wang, "Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs" ,IMC'07, October 24-26, 2007,IEEE CNF, San Diego, California, USA.
  2. Shetty, Sachin ,Song, Min ,Ma, Liran, "Rogue Access Point Detection by Analyzing Network Traffic Characteristics" Military Communications Conference, 2007. MILCOM 2007, IEEE, Orlando, FL, USA,
  3. Srilasak, S. Wongthavarawat, K. Phonphoem, A,"Integrated Wireless Rogue Access Point Detection and Counterattack System", Information Security and Assurance, IEEE CNF April 24-28, 2008,Pathumthani,Thailand.
  4. Beyah, R. Kangude, S. Yu, G. Strickland, B. Copeland, J. , "Rogue access point detection using temporal traffic characteristics" Global Telecommunications Conference, GLOBECOM '04,IEEE CNF, Atlanta, GA, USA.
  5. Raheem Beyah, Shantanu Kangude, George Yu,Brian Strickland, and John Copeland, "Rogue Access Point Detection using Temporal Traffic Characteristics," in Proc. of IEEE GLOBECOM, Dec. 2004.
  6. Hu Zhengbing, Li Zhitang, Wu Junqi , "A Novel Intrusion Detection (NIDS) Based on Sinatures Search of Data Mining" in 2008 IEEE workshop on knowledge Discovery and Data Mining.
  7. Lee,W. ,Stolfo, S. J. and Mok,K. W. "A Data Mining Framework For Building Intrusion Detection Model", in Proceeding of the IEEE Symposium on Security andPrivacy,1999. pp. 153-157.
  8. Yang,X. R. ,Song,Q. B. and Shen, J. Y. ,"Implementation Of Sequence Patterns Patterns Mining In Network Intrusion Detection System", in Proceeding of ICII,2001. pp. 323-326.
  9. Hu Zhengbing, Ma Ping. Data Mining Approaches to Signatures Search in Network Intrusion Detection. Control Systems and Computers (USiM). ?. 1, 2005. pp:83-91. ISBN:0130-5395.
  10. Hu Zhengbing,Shirochin V. P. , Su Jun, An Intelligent Lightweight Intrusion Detection System(IDS), Proceedings of IEEE Tencon'2005, Melbourne, Australia, 21-24
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Network Security Rogue Access Point Network Attacks