Introduction
Wireless
networking is becoming the choice for business and home users alike since
wireless network is easier and cheaper to configure software and hardware. Therefore,
information security is a growing concern as wireless computer networks are on
the increase and also due to intruders trying to intercept confidential
information. According to Siep et al. (2000), the standards for wireless
computer networks was initiated in 1997. As Stringer
(2005) stated, wireless networks can be
divided into two architectural modes, namely infrastructure and Ad hoc. In
Infrastructure wireless station such as laptops, printers, etc. which
communicates with each other and other network resources through an access
point, whereas Ad hoc, wireless stations directly communicate with each other.
Wireless Ad hoc networks pose many nontrivial challenges to security design
than wired networks. This report illustrates how to prevent, detect and the
action to be taken when wireless security threats are detected.
How to prevent?
1. Change
default wireless router password
As Notenboom
(2009b, http) stated, a particular type of
routers and access points have same default router password, paving the way for
attackers to take control of the network easily. Therefore, it is strongly
recommended to change default router login details at the outset.
2. Change
router password periodically with strong passwords
Strong password is needed to protect
data since malware does complex spoof attacks simply by altering how and where
the router gets its DNS information (Notenboom, 2009a, http). Changing password regularly
prevents security breaches by malicious users.
3. Firewall to
break attacks
Firewalls are
used to prevent intruders from entering wireless network while controlling
spyware, remote login, viruses, spam problems, etc (Tyson, 2000, http). Firewalls can be found as
software or hardware. Firewalls can be used to make Demilitarized Zone (DMZ),
restricting external access to the network (Gite, 2007, http).
Figure
1: How software firewall works (Max, 2006, http)
4. Data
encryption
According to
Ahmad et al. (2003), asymmetric and symmetric are data
encryption methods that are used to encrypt data in packets which carries one
device to another by blocking intruders (Man-in-the-middle) from accessing
data. Receiving device can decrypt data with a key which is known only to sender
and receiver.
5. Set up Access
Control List (ACL) in wireless routers
Devices are being protected in wireless
network as ACLs that provide users with access and privileges to specific
resources. Once ACL is enabled, access is denied for any wireless device which
is not in the list (Netgear, 2010, http).
6. Integrity
Controls
Integrity Controls are needed to ensure information
from not getting altered or destroyed in an unauthorized manner (Bertino and Sandhu, 2005). As Byun et al (2006) stated, integrity controls can
also be used to control information flow, data verification, autonomous data
and prevention of fraud and error.
7. Turn off
unnecessary devices, features and services
Turning off
unnecessary features and services when they are not needed will be a safeguard
method against intruder attacks. Also turning off wireless network when not
being used denies unauthorized access.
Apart from
above methods, disabling SSID (Service Set Identifier) broadcast, enabling MAC
filtering, disabling DHCP (Dynamic Host Configuration Protocol) and enabling
HTTPS are the other important security controls.
How to detect?
1. Audit
Control Software
Audit
control is a fundamental requirement to keep a track of users and their
activities, spot suspicious activities, location of users, etc. in wireless
network. Therefore, audit controls are useful to detect those who access the
network and resources when there is any suspicious activity is surfaced (TheIndustryRadarBusinessNetwork, 2010).
2. Wireless Intrusion
Detection System (WIDS)
According to Poblete (2005), IDS are used to monitor traffic
on the network and detect intrusions such as a hacker attempts to break into or
misuse a computer system. Poblete further stated
WIDS monitor packets on network and attempt to discover whether altering the
data has been attempted.
Figure
2: How WIDS works (TechLink, 2010, http)
3. Honey-pot
Network
According to Zolfaghar and
Mohammadi (2009) and Guanlin et al. (2009), a honey-pot is designed with false
APs or wireless devices, which appears to have value and be an easy target for
attackers by being a vulnerable and well-situated entity. Therefore, it is easy
to distract intruders or attract and trap attackers who attempt to alter the
network.
Figure 3:
Honey-pot in a network (Guanlin et al., 2009)
Action to be taken when detected
1.
Change security information
Change
login details in router, if possible. If it is not feasible change login
details (hackers changed the information), to factory defaults. Then, add
necessary security or add MAC address filtering and change
default password (Hassell, 2006).
2.
Shut down all processes
In
order to preserve the state of the network for further investigation shut all
processes off (Hassell, 2006). Therefore,
it prevents intruders from having access and being hacked further.
3.
Notify stakeholders and important communities
In
order to prevent others from being hacked notify parties of the network (Hassell, 2006). A clear
example is credit card counterfeit fraud where so many card issuers could be
targeted by fraudsters as all issuing and acquiring institutions are linked to
a single hub.
4.
Observe and preserve evidence to take legal action
Wireless
network can be cracked either from inside or outside the network. In order to
identify from where the treats came, preserve the scene of crime. This can be
done by taking bit-for-bit copy of suspected files or investigating audit logs
which have all the events logged (Hassell, 2006).
Summary
This report
discussed how to prevent, detect and the action to be taken when wireless
security threats are detected. Recovery after intruders attack is not easier
and the preventive action is the remedy though it is expensive, which is an
intangible investment. The above mentioned actions are
necessary to safeguard confidential and important information of the resources
in wireless network and also to take follow up actions.
It
should also be mentioned that hackers always try to explore new way to counter
precautionary measures and hence, the system administrators should be vigilant
round the clock.
Bibliography
References
Ahmad, J., Garrison, B., Gruen, J., Kelly, C. &
Pankey, H. (2003). 4G Wireless Systems [Online].
Available from: <http://www.google.lk/url?sa=t&source=web&cd=34&ved=0CDEQFjADOB4&url=http%3A%2F%2Fckdake.com%2Fsystem%2Ffiles%2F4gwireless.pdf&ei=0FgRTcSNIoKurAfm54nnCw&usg=AFQjCNHbdqRNh-i6vo1h00nX1mgIsyn32A>.
Bertino, E. &
Sandhu, R. (2005). Database security - concepts, approaches, and challenges. Dependable and Secure Computing, IEEE
Transactions on, Vol 2,No 1, pp. 2-19.
Byun, J.-W., Sohn, Y.
& Bertino, E. (2006). Systematic
control and management of data integrity. Proceedings
of the eleventh ACM symposium on Access control models and technologies.
Lake Tahoe, California, USA: ACM.
Gite, V. (2007). Linux Demilitarized Zone (DMZ) Ethernet
Interface Requirements and Configuration [Online]. nixCraft. Available
from: <http://www.cyberciti.biz/faq/linux-demilitarized-zone-howto/> [Accessed 22nd
December 2010 2010].
Guanlin, C., Hui, Y.
& Zebing, W.(2009). Research of wireless intrusion prevention systems based
on plan recognition and honeypot. In: Wireless Communications & Signal
Processing, 2009. WCSP 2009. International Conference on, 13-15 Nov. 2009 2009.
pp. 1-5.
Hassell, J. (2006). Checklist: 11 things to do after a hack [Online].
iMix. Available from: <http://conven.imix.co.za/node/61231> [Accessed 23rd
December 2010 2010].
Max. (2006). Firewalls (2) - How Firewalls Work [Online]. Best Security Tips. Available
from: <http://www.bestsecuritytips.com/xfsection+article.articleid+2.htm> [Accessed 22nd
December 2010].
Netgear. (2010). Securing Your Wireless Network: Access
Control List [Online]. Netgear. Available from: <http://kb.netgear.com/app/answers/detail/a_id/13112/~/securing-your-wireless-network:-access-control-list> [Accessed 22nd
December 2010 2010].
Notenboom, L. A.
(2009a). How do I change my router's
password? [Online]. Puget Sound Software, LLC Available from: <http://ask-leo.com/how_do_i_change_my_routers_password.html> [Accessed 21st
December 2010 2010].
Notenboom, L. A.
(2009b). How do I secure my router? [Online].
Puget Sound Software, LLC Available from: <http://ask-leo.com/how_do_i_secure_my_router.html> [Accessed 21st
December 2010 2010].
Poblete, O. (2005). An
Overview of the Wireless Intrusion Detection System. SANS Institute InfoSec Reading Room [Online], 1.4. Available from:
<http://www.sans.org/reading_room/whitepapers/wireless/overview-wireless-intrusion-detection-system_1599> [Accessed 22nd
December 2010].
Siep, T. M., Gifford, I.
C., Braley, R. C. & Heile, R. F. (2000). Paving the way for personal area
network standards: an overview of the IEEE P802.15 Working Group for Wireless
Personal Area Networks. Personal
Communications, IEEE, Vol 7,No 1, pp. 37-43.
Stringer, L. (2005).
Detecting and Investigating Wireless LAN Security Breaches [Online]. Available from: <http://homepage.ntlworld.com/leon.stringer/cs/FCC/Detecting_and_Investigating_Wireless_LAN_Security_Breaches.pdf>.
TechLink. (2010). Wireless Network Intrusion Detection [Online].
TechLink. Available from: <http://techlinkcenter.org/summaries/wireless-network-intrusion-detection> [Accessed 22nd
December 2010].
TheIndustryRadarBusinessNetwork.
(2010). Protecting Your Clients and Your Business: From Risk Assessment to Compliance and
Encryption Available from: <http://digitalbenefits.typepad.com/HITECH/HHDummies.pdf> [Accessed 22nd
December 2010].
Tyson, J. (2000). How Firewalls Work [Online].
HowStuffWorks, Inc. Available from: <http://www.howstuffworks.com/firewall.htm#> [Accessed 21st
December 2010 2010].
Zolfaghar, K. &
Mohammadi, S.(2009). Securing Bluetooth-based payment system using honeypot. In: Innovations in Information Technology, 2009.
IIT '09. International Conference on, 15-17 Dec. 2009 2009. pp. 21-25.
Comments
Post a Comment