StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless Network Active Attacks - Essay Example

Cite this document
Summary
The air in the region of offices is probable stopped up with wireless networks and devices like mobile phones and microwaves. That undetectable traffic jam can cause interference troubles with the Wi-Fi…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.8% of users find it useful
Wireless Network Active Attacks
Read Text Preview

Extract of sample "Wireless Network Active Attacks"

Jamming a Network: Jamming a network is a crucial problem occurs in the wireless networks. The air in the region of offices is probable stopped up with wireless networks and devices like mobile phones and microwaves. That undetectable traffic jam can cause interference troubles with the Wi-Fi system. Large number of consumer use devices such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker takes advantage of this and unleash large amount of noise by using these devices and jam the airwaves so that the signal to noise go down, in the result wireless network stop to function.

The best solution to this problem is RF proofing the nearby atmosphere.Unauthorized Access:The use of Wireless technologies is increasing rapidly and Wireless technology is much admired. So companies are exchanging their usual wired networks with wireless - even for non-mobile functions. There have been several warnings from security advisors regarding wireless protocols, Especially for WEP, being disgustingly insecure. Unauthorized access to wireless network can occur from different ways for example, when a user turns on a computer and it latches on to a wireless admittance point from a neighboring company’s overlapping network, the user may not even know that this has occurred.

But, it is a security violate in that proprietary company information is exposed and now there could exist a link from one company to the other. Denial of Service:A denial-of-service attack is an effort to make computer resources unavailable to its intended users. It is the malicious efforts of a persons or number of persons to stop a web site or service from carrying out proficiently or at all. One general way of attack involves saturating the target machine with external communications requests, such that it cannot react to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.

It normally slows down the network performance. For example speed of opening files and closing files slow down. System will also be unable to access any web site. The bandwidth of a router linking the Internet and a local area network may be consumed by DoS. There are also other types of attack that may include a denial of service as a module, but the denial of service may be a part of a larger attack. Illegal utilization of resources may also result in denial of service. For instance, an interloper can use someone’s secret ftp area as a place to store illegal copies of commercial software, overwhelming disk space and generating network traffic.

Man in the Middle:In the man in the middle attack an attacker sits between the client and the server with a packet analyzer. This is the disparity that most people think of when they hear the term man in the middle. There are also many other forms of the man in the middle attacks that exploit the fact that most networks communications do not use a strong form of authentication. Unless both ends of the session frequently verify whom they are talking to, they may very well be communicating with an attacker, not the intended system.

References:1. Brenton, C. & Hunt, C. 2003. Network Security. 2nd Ed. New Delhi: BPB Publications.2. Hossein, B., 2005. The Handbook of Information Security. John Wiley & Sons, Inc.3. L. Blunk & J. Vollbrecht., 1998. PPP Extensible Authentication Protocol (EAP). Tech. Internet Engineering Task Force (IETF).4. Matthew, S. Gast., 2002. 802.11 Wireless Networks: The Definitive Guide: O’Reilly & Associates.5. Vikram, G. Srikanth, K. & Michalis, F., 2002. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks.

Anaheim, CA: Proceedings of 2002 MILCOM Conference.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1543969-wireless-network-active-attacks
(Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 Words)
Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1543969-wireless-network-active-attacks.
“Wireless Network Active Attacks Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1543969-wireless-network-active-attacks.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless Network Active Attacks

Sensor Network Secure Routing Protocols

Recently, there have been many developments as concerns mounting secure routing protocols for ad hoc networks incorporating a significant number of on-demand secure routing protocols to shield a number of probable attacks.... However, the wireless sensor network architecture for WSN like any other wireless technology is subjected to a number of security attacks because it uses broadcast way of a transmission channel.... The paper "Sensor network Secure Routing Protocols" describes that in AODV and other protected protocols supported by AODV, RREP or Route Request packages do not take a node listing....
18 Pages (4500 words) Coursework

A Wireless Network Structure Considering Security

This paper "A wireless network Structure Considering Security" focuses on the fact that Wireless Networks are widely used both for individual or business purposes.... We will also point to some of the ways crackers use to enter wireless networks and how they can easily bring down even a whole none wireless network via that.... No physical connection is established between the devices in a wireless network.... You can also use General Packet Radio Service (GPRS) that is probably provided by your mobile phone network's operator to access to the internet....
9 Pages (2250 words) Coursework

Excessive Filtering of the Internet in Schools

No physical connection is established between the devices in a wireless network.... hellip; People access the e-books or scanned books through the library network and they can simply share what they access with others for example through laptops and PDA's.... No cable or wire to joint two devices to each other or one device to a network.... Bluetooth has emerged as a very popular ad hoc network standard today.... Bluetooth network applications include wireless synchronization, e-mail/Internet/intranet access using local personal computer connections, hidden computing through automated applications and networking, and applications that can be used for such devices as hands-free headsets and car kits....
9 Pages (2250 words) Essay

Wi-Fi Technology: Wireless Fidelity

However, our focus in this paper would be upon the exploitation of WPS and how it can be easily compromised using brute-force attacks and other kinds of attacks.... In theory, wireless networks are more prone to attacks and are less secure than the wired networks because all the communications are traveling over the air.... An essay "Wi-Fi Technology: Wireless Fidelity" outlines that it was originally designed to allow network elements to roam in warehouses and manufacturing facilities without getting out of reach of the connected network and without being subjected to cumbersomeness of wired network elements....
10 Pages (2500 words) Essay

Security in Short Range Wireless Networks

his thesis will also provide security problems and solutions to each of the mentioned wireless network.... nother common security problem is a denial of service attacks.... Once the victim clients connect, traffic is routed using DHCP and DNS through the evil twin, and this may lead to man-in-the-middle attacks (Lemstra, Hayes, & Groenewegen, 2010).... In this scenario, an attacker prohibits the usage of vital network services to legitimate users....
12 Pages (3000 words) Case Study

Voice over Wireless Fidelity

Hackers, who know the default setting, can gain access to a wireless network this way, the network fails to require identification and verification of all users.... In the organization's individuals setting up the network sometimes fail to understand the security requirements.... The paper starts with a brief introduction of wireless fidelity and then discusses issues in wireless fidelity and disadvantages.... hellip; Wi-Fi is a wireless technology works like a cell phone and offers fast and effortless connection from anywhere within the range of a base station....
8 Pages (2000 words) Term Paper

Role of Network Security: How Does It Protect You

From the paper "Role of network Security: How Does It Protect You" it is clear that network security is a very challenging and difficult task.... Once a reliable system is built everything that goes on with the network can be evaluated with respect to that policy.... This system is so designed that authorization of access to data in a network is controlled by the network administrator only without the interference of any other person....
6 Pages (1500 words) Essay

Denial of Service Attacks

The paper 'Denial of Service attacks' presents the billions of computers that exist globally are all connected through the internet.... hellip; The computer interconnectivity, which is dependent, on the global internet, however, makes its components an easy target for attackers who try to deplete their resources and launch denial of service attacks against them.... The DoS attacks can be described as a single group or person's spiteful attack to cause the site....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us