National Conference on Communication Technologies & its impact on Next Generation Computing 2012 |
Foundation of Computer Science USA |
CTNGC - Number 3 |
November 2012 |
Authors: Mohd. Izhar, Mohd. Shahid, V.r.singh |
134b6cf7-b26d-45b9-89ec-bb994c085b80 |
Mohd. Izhar, Mohd. Shahid, V.r.singh . Network Security Vulnerabilities Heading for Malicious Attack. National Conference on Communication Technologies & its impact on Next Generation Computing 2012. CTNGC, 3 (November 2012), 17-22.
An organization requires that WLAN must address three critical areas: Data Confidentiality and Integrity, Authentication and Access Control and Intrusion Detection and Prevention. By the growth of Wireless Network, so many security threats have also been raised that does not require much expertise and expensive equipment to launch an attack against an organization. Such attacks are initiated from inside or outside at a great distance using readily available standard wireless equipment. These days the WLAN system is migrating from Pre-RSNA methods of Security to the RSNA and using WPA/WPA2 with AES encryption, in conjunction with 802. 1x authentication for providing a security to WLANs and at the same time wireless intrusion detection and prevention systems are being made more capable and easier to manage but still wireless security solution in place are vulnerable to malicious attacks and need to be kept reviewed as per standard of IEEE as well of Wi-Fi Alliance and beyond it. WLAN vendors and researchers look into it and try to ensure the solution to the problem. MAC address spoofing refers to the getting the MAC address of other network card and using it on the network for misrepresentation and illegitimate use. This paper helps the community at large in knowing several security tools. These tools scan whole network and provide various information of node(s) within the node to the malicious node (attacker), the node which intend to attack the network and spoof MAC address and breaches the security. This MAC address is continuously sent over at Wi-Fi networks, even if they use secure WEP/WPA Encryption. The node with fake MAC address masquerade as an authorized wireless access point or as an authorized client. Such node launches denial of service attacks, bypass access control mechanisms, or falsely advertise services to wireless clients.