Abstract:
The World is becoming increasingly more mobile over the past few years. The
conventional methods of networking, which rely on physical cables, have proved
insufficient to address the challenges posed by our current collective lifestyle. As
individuals and businesses require constant connectivity and the ability to move
freely, wireless networking has emerged as a crucial solution. Wireless networks
use technologies such as 802.11 (Wi-Fi) to provide internet access without the
constraints of physical cables. Devices can remain connected to the network while
roaming, allowing for greater mobility. Access points are used to enhance Wi-Fi
signals, ensuring that devices can connect to the network even when they are far
from the router. This has made wireless networks immensely popular in various
settings, including public places like restaurants and cafes. However, wireless
networks are not without their security challenges. They are vulnerable to both
passive and active attacks. A passive attack involves an attacker capturing the
wireless signal without sending any signals themselves. These attacks can be
easily carried out using wireless antennas and are often undetectable. It is
important to assume that attackers can see everything on a wireless network as
part of a comprehensive security procedure. To secure a wireless network,
administrators need to be aware of the vulnerabilities that exist and the types of
attacks that can exploit them. Malicious software, or malware, poses a significant
threat to wireless LANs as they have become more common. These programs can
disguise themselves as legitimate code or programs and once inside the network,
attackers can perform a range of unauthorized actions such as transferring files,
modifying data, or deleting files. Another security concern is the presence of
backdoors, which refer to methods that allow authorized and unauthorized users
to bypass normal security measures and gain high-level access to a computer
system, network, or software application. These backdoors can be exploited by
attackers to gain unauthorized access to sensitive information or control over the
network. A denial-of-service (DoS) attack is a common threat to wireless networks
as well. It involves disrupting the efficient use of network resources and essential
services, rendering the network unavailable to legitimate users. This can disrupt
operations and cause significant inconvenience or financial loss. Session hijacking
attacks occur when an attacker takes over a user's wireless session. This can
happen while the user is performing activities such as checking their credit card
balance, paying bills, or shopping online. The hijacker typically targets the user's
browser or web application programs, allowing them to gain unauthorized access
to sensitive information or perform fraudulent actions. Thereof, while wireless
networks provide immense convenience and mobility, they also present security
risks. It is crucial for network administrators to be aware of these vulnerabilities
and implement appropriate security measures to protect against passive and active
attacks, malware, backdoors, DoS attacks, and session hijacking. This will help
ensure the integrity and privacy of the network and its users.