Risk Assessment For Identifying Intrusion Detection

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Technology makes this world as a small globalised village; in fact we like to consider both the aspect under this network system which makes our world to a global village. In this paper we have taken one of the most amazing network concepts which makes network simpler. By considering the aspect of both side as of good and its related issues like most important and unavoidable is i.e. "Security". Hence, enhancing the security in wireless networks has become of vital importance. In this perspective of concept, we mainly study two security aspects of wireless networks. One is service confidentiality and access control that is to ensure only legitimate users can access service data according to their privileges and in other perspective is of service attack. Wireless broadcast is a convenient and effective approach for disseminating data to a number of users. User training in computer and network security is crucial to the survival of modern networks, yet the methods employed to train users often seem ineffective. The secrecy issues in the context of mandatory and discretionary access control in a multilevel networked environment. Hence of, we stressed on two aspects key management scheme is proposed to address secrecy and efficiency in broadcast services, where keys are used for service confidentiality and access control.

Keywords: Security, Unauthorized Access, Authentication.

1. INTRODUCTION

Wireless network trend become the most viable part of the network in these days, which needs some of the issues to be rectified. In recent years, many researchers have studied the limitations of the security mechanisms that protect wireless networks. If we consider the statistical data of wireless devices which shows the sales of embedded wireless devices grows 66.2% each year [12]. Fig.1.1 shows that hot spots are becoming more frequent in public areas such as airports, hotels, and retail stores. Newer generations of mobile computing equipment come with wireless support standard. In 2003, 55% of laptops sold had embedded wireless support built in [12], and this percentage is expected to grow even more due to technologies like Intel’s Centrino chip. Indeed, from corporate networks to home networks, the number of wireless networks and clients is on the rise. Wi-Fi has undertaken a remarkable journey in the space of just a few short years. It is a journey that has been defined by a global spread of investment by network operators, the integration of Wi-Fi as a key component of a heterogeneous network strategy, the emergence of new and innovative business models and, perhaps most importantly, by a strengthening of user dependence on Wi-Fi. It is now widely accepted that operators wishing to provide a complete set of broadband-based services to their customers will need to do.

Fig.1.1 Showing Attitude of the Company towards WI-FI

In the fig.1.1. , The survey shows how the demand increasing with time towards the sensation of wireless network,

2. RELATED WORK

Wi-Fi is also appearing in many new devices, not just in laptop and desktop computers. Many PDAs have slots for Wi-Fi cards, and the first Wi-Fi capable phones are appearing on the market. The growth of devices will undoubtedly spur even more innovation in the public wireless LAN marketplace. In ad hoc mode, each client communicates directly with the other clients within the network, the ad hoc mode is designed such that only the clients within transmission range (within the same cell) of each other can communicate. If a client in an ad-hoc network wishes to communicate outside of the cell, a member of the cell msy operate as a gateway and perform routing.

Fig.2.1 Showing the connectivity and Attacker enter to the system of network.

Any network, wireless or wire-line, is subject to substantial security risks and issues. These include:

• Threats to the physical security of a network

• Unauthorized access

• Privacy

In terms of efficiency if we measure and consider mobile device is resource-limited in terms of storage, energy and computation. Hence, it would be efficient if the scheme allows a user to hold as few as possible keys for his subscription to save storage, and change as few as possible keys in a rekey event to save energy and computation. Wireless networks add an extra level of security complexity compared to wired networks. Whereas wired networks send electrical signals or pulses of light through cable, wireless radio signals propagate through the air and are naturally easier to intercept. Signals from most wireless LANs (WLANs) pass through exterior walls and into nearby streets or parking lots. Although most hackers are using these connections as a means to get free Internet access or to hide their identity, a smaller group sees this situation as an opportunity to break into networks that otherwise might have been difficult to attack from the Internet. Unlike a wired network, a WLAN sends data over the air and may be accessible outside the physical boundary of an organization. When WLAN data is not encrypted, the packets can be viewed by anyone within radio frequency range. For example, a person with a Linux laptop, a WLAN adapter, and a program such as TCPDUMP can receive, view, and store all packets circulating on a given WLAN

3. METHODS

Importantly, however, the speed of Wi-Fi innovation is replicated at the low end of the market. Wi-Fi has become an integral feature of low-cost devices sold in huge volume in emerging markets. Price-sensitive consumers in markets such as China and India can purchase locally-manufactured devices with Wi-Fi support for less than US$50. But branded devices are also reaching the market at lower and lower price points with Nokia’s Asha series of 2G and Wi-Fi-capable devices a key but by no means isolated example. Clearly, the momentum behind Wi-Fi gathered pace during 2012 and the outlook for the coming 12 months is equally positive for the Wi-Fi ecosystem. There are three key factors that will add further fuel to the fire. Security, cost, and convenience may motivate the use of multilevel networks. It reduces the number of separate machines that individual users must log into and also reduces the operational costs of housing all of the extra equipment necessary to run separate networks for each classification level. Multilevel networks also allow the sharing of data across different sensitivity levels in real time.

The association process is a two step process involving three states:

1. Unauthenticated and unassociated,

2. Authenticated and unassociated,

3. Authenticated and associated.

In the fig.3.1. , after identifying an access point, the client and the access point perform a mutual authentication by exchanging several management frames as part of the process. The two standardized authentication mechanisms are described. After successful authentication, the client moves into the second state, authenticated and unassociated. Moving from the second state to the third and final state, authenticated and associated, involves the client sending an association request frame, and the access point responding with an association response frame. Another area of concern for security-conscious subscribers is the growing use of the Internet.

Fig.3.1 Showing the Architectrual authentication view of High level Security.

Often, if users from inside can get out to the Internet, then users from outside can get into a network if proper precautions haven't been taken. And this applies not only to the Internet, but also to any remote network access capabilities that might be installed. Remote access products that allow traveling sales and marketing people to dial in for their email, remote offices connected via dial-up lines, intranets, and "extranets" that connect vendors and customers to a network can all leave the network vulnerable to hackers, viruses, and other intruders. Firewall products offering packet filtering, proxy servers, and user-to-session filtering add additional protection.

4. CONCLUSION

The industry is moving toward new standards to make it easier to access Wi-Fi networks at home and abroad, paving the way for a new wave of increased Wi-Fi uptake and usage. Standards are essential to enable operators to realize the opportunity that Wi-Fi roaming presents. The industry must continue working closely together to ensure that common standards offer a seamless, cellular-like Wi-Fi experience to end users and also to lay a solid foundation on which operators can compete. The WBA is working to meet this challenge by defining Wi-Fi roaming interoperability standards. Hence of, It will lead to higher security with high optimization concept toward the system high data rate.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now