Addressing Wireless Threats With Integrated Wireless Ids And Ips In The Cisco Unified Wireless Network

Read Complete Research Material



Addressing Wireless Threats with Integrated Wireless IDS and IPS in the Cisco Unified Wireless Network

Introduction

The topic under study is based on addressing wireless threats and Integrated Wireless IDS and IPS in the Cisco Unified Wireless Network. The development of new technology has immensely improved security of wireless LAN. The advent of wireless network technologies in general and in particular the development of IEEE 802.11 standards is very innovative in that they allow the deployment of wireless networks (Dyson, 1998, p.98). With the implementations of new technologies, wireless companies feel safer and secure from the potential threats. However, this is the fact that the threats still exists but, the benefit to IT companies is that the potential threats can be detected using Cisco unified wireless networks.

The issue arises because of the fact that threat detection and prevention, is not enough for IT companies to protect themselves. The hardwired corporate networks still imposes vulnerable threats to enterprises. In general, a secure network can be described as a system whose users do not feel any apprehension or anxiety while using the network. Although different network media may require different features, confidentiality, integrity, authentication, availability, and access control are the essential requirements for all secure systems.

Challenges

Wireless networks are an excellent complement to fixed networks. It is convenient for users to access network resources from nearly all locations within their private network range, including public places where wireless network services are provided. In addition, such networks are easy to deploy. Infrastructure based wireless networks need no more than an access point, and independent wireless networks need almost nothing to set up connections between devices.

Since, wireless devices and communication has gained so much popularity and store so much important and valuable data, hackers have stepped in for accessing this information. The 802.11 standards for securing wireless network systems are not providing data transmission security against eavesdropping. Some wireless network systems are unsecured by default settings. Residential wireless network systems may be vulnerable to external attacks since the consumers may not be aware of the default settings. Every wireless communication system and network has its drawbacks (Garfinkel, 2000, p.33). IEEE Researchers having ISAAC- Internet security, application, authentication and cryptography) have observed flaws present in IEEE 802.2-11 standards that could be exploited by skillful hackers.

Possible Wireless Threats

Rogue Access Points and Clients

Rogue access point is one of the most common types of wireless threats. Typically, an employee brings this threat in order to gain unfettered access to wireless. Some of these features make wireless networks easier to be attacked versus wired networks, since most network attacks assume that an attacker can access the network. For instance, attack may occur when an adversary simultaneously launches a masquerading attack and a malicious AP attack. First, the adversary needs to masquerade as a legitimate station to connect to the AP. At the same time, the adversary also needs to impersonate an AP and get an association from a legitimate STA. The adversary must keep the two connections active. If the legitimate ...
Related Ads