Wireless Network Security Audit and Best Practices

Verified

Added on  2020/02/24

|12
|2352
|54
AI Summary
This assignment delves into the crucial aspects of securing wireless networks. It emphasizes the importance of a well-structured audit process that includes evaluating potential threats, implementing robust access control measures, and educating users about network security risks. Key topics covered are obtaining approval for new devices, informing users about remote network security vulnerabilities, and regularly reviewing system logs to ensure data integrity. The assignment stresses the significance of proactive measures and continuous monitoring for maintaining a secure wireless network environment.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: WIRELESS NETWORK AND SECURITY
Wireless Network and Security
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
WIRELESS NETWORK AND SECURITY
Table of Contents
1. Record WLAN access point at a public place..............................................................................2
2. Information of the Wireless network..........................................................................................4
3. Using sniffing tool for testing......................................................................................................4
4. Recommendation for increasing the security of WLAN..............................................................6
a. Tables for the location............................................................................................................6
b. Screenshots............................................................................................................................7
c. Explanation of the technique used for securing and managing..............................................9
i. Discussion of the dual bands and its advantage...................................................................9
ii. Security implication.............................................................................................................9
iii. Other Aspects...................................................................................................................10
Bibliography..................................................................................................................................11
Document Page
2
WIRELESS NETWORK AND SECURITY
1. Record WLAN access point at a public place
The WLAN interface is recorded for a public place near the home and technical data is gathered
from the access point for proceeding with a vulnerability testing of the wireless networks. The various
risk associated with the wireless network are identified and Acrylic Wi-Fi Home version is used for the
detailed analysis of the wireless network. There are different other tools available also that can be
applied for the analysis of the wireless network at the public place [12]. The quality of signal MAC
address, RSSI, Channel, standards used, maximum speed, WEP, WPA, WPA2, WPS, Vendor, First, Last
and Type can be analyzed using the tool. Moreover the strength of the signal, quality of the network,
channels working in 2.4 GHz or 5 Ghz can be known and it helps to generate a statistics of the network.
The sniffer can be used for generate the access point list and create a statistic of the wireless network.
The area of coverage of the network can also be found from the sniffing tool and it can find the flow of
data and find the spectrum to choose the best wireless connection installed in the network [7]. The
signal quality and the coverage area provided by the signal is also analyzed by the network sniffing tool.
The number of channels provided by the wireless access point can also be found using the Acrylic Wi-Fi
tool and it can be used for analyzing the performance of the wireless network.
The wireless network found near the home are analyzed and a penetration testing is done on
the network for finding the vulnerability and the risk associated with the network. The access point are
secured with different encryption algorithm such as WPA, WPA2 and the version of the WPS used can
also be analyzed using the network sniffer. The coverage area of the wireless signal are required to be
segmented for identification of the transmission capacity and bandwidth allocated to the network. The
setup process of the tool is shown below with the sniffing of the network.
Document Page
3
WIRELESS NETWORK AND SECURITY
Figure 1: Setup of Acrylic Wi-Fi Home network sniffing tool
Figure 2: Available wireless access point near the home network

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
WIRELESS NETWORK AND SECURITY
2. Information of the Wireless network
For the planning of the Wireless system distinctive criteria are required to be viewed as, for
example, testing of the flag scope, testing of the execution of the system, testing of the security
weakness, confirmation and acknowledgment testing and pilot testing of the system [5]. The Wi Fi
signals are produced from the remote access focuses and for testing the scope of the flag a flag meter is
utilized and it quantifies the flag esteems that are required for covering the territories. The useful
necessity of the business is dissected for testing the usefulness of the remote arrangement and the
security approach took after for the advancement of the system is additionally investigated [2]. The
strategy comprises of the blueprint of the structure and principles and conventions took after for the
advancement of the remote system. The present system utilizes the 802.11 standard and WPA/AES
convention is taken after for securing the entrance point [6]. There is a necessity of security evaluation
and checking the security status of the system and the inadequately arranged access point. The Wi fi get
to point is required to be broke down with wire shark and the entrance point is arranged with the
default security settings i.e. the latency time out and limit parameters are not arranged [9]. The
entrance point is required to be secured and the unused administration conventions are required to be
handicapped for expanding the security of the system. The SSID are shown as the name of the system
and the system is fragmented for playing it safe from the pernicious system.
The present system is produced following the customer to customer method of transmission
and subsequently the remote stations are associated in the system by means of the entrance point. The
correspondence of the customer are controlled utilizing distinctive system correspondence conventions
and there is a necessity of key security patches.
3. Using sniffing tool for testing
Acrylic Wi-Fi Home is utilized for sniffing the remote system near the home network and an
underlying testing is done on the present system situation and distinguish the dormancy of the system.
A system score is created and the points of interest of the transmission capacity, dormancy, jitter, ping
misfortune and security of the system can be gotten from the device. The impediment of the remote
system is talked about and hazard moderation technique that can be connected for expanding the
security of the remote system is examined in the report. Distinctive encryption systems that can be
connected is additionally examined and the best practice that the association can apply for the
advancement of the remote system is likewise talked about in the report.
Document Page
5
WIRELESS NETWORK AND SECURITY
Figure 3: Testing the channels of the wireless network running at 2.4 GHz
The channels provide by the network is analyzed for finding the area of coverage and analyzing
the vulnerability. The technical information about the channels in the 2.4 Ghz can be found and shown
above. The operating frequency is also found from the analysis of the current network.
Document Page
6
WIRELESS NETWORK AND SECURITY
Figure 4: Testing the channels of the wireless network running at 5 GHz
The figure shows the 5 Ghz access point channels within the range of the wireless network and it
is used for the identification of the vulnerability. The channels can be helpful for finding the strongest
access point.
4. Recommendation for increasing the security of WLAN
There is a requirement for the implementation of wireless intrusion detection program for
restricting the intruders to access the internal network components and secure the network.
a. Tables for the location
A table is created for each of the location and documented below:
Network Technology Data Rate Range Frequency
WWAN GSM Distance of the base
station 100m to 35 km
0.009 to 0.014 ~ 900 MHz
GPRS 0.160
UTMS 0.384 to 2.0
WLAN IEEE 50 meter 54 ~ 2.4 & 5 GHz

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
WIRELESS NETWORK AND SECURITY
802.11a
Ultra
wideband
10 meter 100
IEEE
802.11b
100 meter 11
Bluetooth 10 meter 1
WPAN Infrared
IrDA
1 to 1.5 meter 1 to 16 ~2.4 GHz
Home RF 50 meter 10
b. Screenshots
Figure 4: Sniffing of the data packets using Acrylic Wi-Fi network traffic sniffer
(Source: Created by author)
Document Page
8
WIRELESS NETWORK AND SECURITY
The network testing is done using the Wizard Net rank and the bandwidth, latency, jitter, ping
loss and security of the network is analyzed.
Figure 5: Analysis of attack in the network
(Source: Created by author)
The network packets captured using the Acrylic Wi-Fi network traffic sniffer can be used for
analyzing the attack on the network and can be used as an evidence in future for reporting against the
attack. In the above case an intruder attack is performed in the network for accessing the university
content of a network and the packets captured from the network is used for finding the source of the
attack.
Document Page
9
WIRELESS NETWORK AND SECURITY
Figure 6: Information of the network from the captured packet
(Source: Created by author)
A frame can be captured using the Acrylic Wi-Fi network traffic sniffer and it can be further
analyzed for getting the source and the destination address in the network. The epoch time and the
arrival time of the data packets can also be found by analyzing the data packets.
c. Explanation of the technique used for securing and managing
i. Discussion of the dual bands and its advantage
The dual band wireless network have the support for communication in two different
frequencies i.e. 2.4 Ghz and 5 Ghz. It can also cover a more area than the single band with strong
network signal strength and thus have good speed of transmission of the data packets in the network.
The remote system distinctive issues may emerge and a large portion of the issue emerges because of
establishment of the modest switch utilizing single band. The establishment of the double band
correspondence direct in the remote system that expands the speed of the system.
ii. Security implication
A test is performed on the current network scenario and the external factors affecting the
wireless network is analyzed for application of the security in the network. The remote access to the
network is required to be restricted for the unknown users and disabling the ARP protocol would reduce
the risk. A strong encryption password and algorithm is required to be used for securing the access point
and restrict the hacker to gain the direct access of the network.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10
WIRELESS NETWORK AND SECURITY
iii. Other Aspects
Distributing a remote system scope outline- It is the obligation of the system manager to cover
the region of the wireless network by examining the entrance point and SSID. The system guide can be
utilized for taking care of and investigating the system for dissecting the security episode in the system.
Advancement of the security setup of Access Point- All the entrance indicates are required be
secured for ensuring the entrance point. The gauge security setup is required to be produced and a
reinforcement is required to be made for reestablishing the gadget in crisis condition. The standard
settings are required to be re-designed for expanding the security of the entrance point.
Keeping a stock of all the remote gadget associated in the system- The stock of the system is
required to be overseen and approval of the gadget is required to be reported for expanding the
assortment of errand.
Instructing the clients about the diverse hazard related with the remote system- The client
utilizing the remote access point is required to be taught in regards to the variables influencing the data
security of the system. A decent arrangement may bomb because of absence of client mindfulness.
Assessing the Audit at a customary interim of time-The logs are required to be checked at a
general interim of time for guaranteeing the honesty and the culmination of the logs. Any variation from
the norm in the system are required to be recognized and researched for expanding the productivity of
the system.
Document Page
11
WIRELESS NETWORK AND SECURITY
Bibliography
[1]. Andrews, J.G., Zhang, X., Durgin, G.D. and Gupta, A.K., 2016. Are we approaching the
fundamental limits of wireless network densification?. IEEE Communications Magazine, 54(10),
pp.184-190.
[2]. Asrodia, P. and Sharma, V., 2013. Network monitoring and analysis by packet sniffing method.
international Journal of Engineering Trends and Technology (IJETT), 4(5).
[3]. De Judicibus, D., Leopardi, S., Modeo, L. and Pergola, N., Toshiba Global Commerce Solutions
Holdings Corporation, 2013. Method and system for secured transactions over a wireless
network. U.S. Patent 8,352,360.
[4]. Falk, R. and Kohlmayer, F., Siemens Enterprise Communications Gmbh & Co. Kg, 2013. Method
and arrangement for providing a wireless mesh network. U.S. Patent 8,495,360.
[5]. Girdhar, P. and Malik, V., 2016. A Study on Detecting Packet Using Sniffing Method. Journal of
Network Communications and Emerging Technologies (JNCET) www. jncet. org, 6(7).
[6]. Hu, W.H., Wang, C. and Bagherzadeh, N., 2015. Design and analysis of a mesh-based wireless
network-on-chip. The Journal of Supercomputing, 71(8), pp.2830-2846.
[7]. Islam, N.N. and Zareen, F., 2014. Comparison analysis of wireless network audits using open
source tools (Doctoral dissertation, BRAC University).
[8]. Liang, C. and Yu, F.R., 2015. Wireless network virtualization: A survey, some research issues and
challenges. IEEE Communications Surveys & Tutorials, 17(1), pp.358-380.
[9]. Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future
trends. CRC Press.
[10]. Öncü, S., Ploeg, J., van de Wouw, N. and Nijmeijer, H., 2014. Cooperative adaptive cruise
control: Network-aware analysis of string stability. IEEE Transactions on Intelligent
Transportation Systems, 15(4), pp.1527-1537.
[11]. Stallings, W. and Tahiliani, M.P., 2014. Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
[12]. Swapna, B.T., Eryilmaz, A. and Shroff, N.B., 2013. Throughput-delay analysis of random linear
network coding for wireless broadcasting. IEEE Transactions on Information Theory, 59(10),
pp.6328-6341.
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]