International Conference on Intuitive Systems and Solutions 2012 |
Foundation of Computer Science USA |
ICISS - Number 1 |
August 2012 |
Authors: Sunil Shirsat, Swapnil Sanap |
860aa493-4364-4012-a6cc-a5eceab269d4 |
Sunil Shirsat, Swapnil Sanap . Providing Data Security in WLAN. International Conference on Intuitive Systems and Solutions 2012. ICISS, 1 (August 2012), 6-10.
Currently many organizations utilize the wireless LAN to provide the access channel to the Internet and Intranet enabling the flexible workforce. While doing so, communications with the Internet is continuously maintained. owever the wireless security is always a primary concern. So for securing data in WLAN it is necessary to detect unauthorized access points which are installed without explicit authorization from a local network management. Rogue APs potentially open up the network to unauthorized parties, who may utilize the resources of the network, steal sensitive information or even launch attacks to the network. This has forced the develop systems that will not only detect the unauthorized access points but also detect network attacks performed by authorized or unauthorized access points so that it protects data from external misuse. In network attacks, the hackers try to break the security of the network, by affecting host and then proceeding towards further damage. Due to the above security and performance threats, detecting unauthorized APs as well as detecting attacks performed by unauthorized or authorized AP'S is one of the most important tasks for a network manager.