Improving Wireless Network Security Against Illegitimate APs using Raspberry Pi
VerifiedAdded on 2023/05/30
|16
|1470
|298
AI Summary
This research aims to improve wireless network security against illegitimate access points using Raspberry Pi. The research questions include improving detection robustness, securing Raspberry Pi, mitigating security risks, and detecting and preventing Evil Twin Attacks on wireless networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
C O M P U T E R & N E T W O R K S
S E C U R I T Y
S E C U R I T Y
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION
• The raspberry Pi boards are effective for any project due to its cost effectiveness, easy usage,
various programmable GPIO pins, various USB port and CPU availability.
• The raspberry pi can be utilized for all types of automation and information gathering.
• Raspberry pi can be hacked.
• Thus, it is essential to secure the raspberry pi and the other connected devices on the network.
• The hackers are interested in hacking the raspberry pi, because it is an entry point for the
internal network, which could be used for attacking the other hosts.
• Moreover, its computing power could be abused for operations such as mining cryptocurrency.
• The attackers can easily collect the file servers, install ransomware, make changes to the
firewall and the settings of router for ensuring continuous access, to perform harmful actions in
the future.
• The raspberry Pi boards are effective for any project due to its cost effectiveness, easy usage,
various programmable GPIO pins, various USB port and CPU availability.
• The raspberry pi can be utilized for all types of automation and information gathering.
• Raspberry pi can be hacked.
• Thus, it is essential to secure the raspberry pi and the other connected devices on the network.
• The hackers are interested in hacking the raspberry pi, because it is an entry point for the
internal network, which could be used for attacking the other hosts.
• Moreover, its computing power could be abused for operations such as mining cryptocurrency.
• The attackers can easily collect the file servers, install ransomware, make changes to the
firewall and the settings of router for ensuring continuous access, to perform harmful actions in
the future.
INTRODUCTION
• The lack of wireless Network’s security is known when an individual is connected to the
network (Cisco, 2018).
• For example, the cafes such as Starbuck and Macdonald are the places where the attacker tries
to carry out the man-in-the-middle attacks.
• The attacker make sure to set up a spoof Wi-Fi AP that looks similar to the legitimate network,
but it captures the traffic and collects confidential information, for performing fraudulent
activities.
• Therefore, this research work improves the security of wireless network against illegitimate
access point.
• It needs to identify the techniques that effectively prevent or mitigate the attacks on the
wireless network.
• The lack of wireless Network’s security is known when an individual is connected to the
network (Cisco, 2018).
• For example, the cafes such as Starbuck and Macdonald are the places where the attacker tries
to carry out the man-in-the-middle attacks.
• The attacker make sure to set up a spoof Wi-Fi AP that looks similar to the legitimate network,
but it captures the traffic and collects confidential information, for performing fraudulent
activities.
• Therefore, this research work improves the security of wireless network against illegitimate
access point.
• It needs to identify the techniques that effectively prevent or mitigate the attacks on the
wireless network.
RESEARCH QUESTIONS
The following are the research questions:
• Will the robustness of detection improve?
• Can the raspberry pi be secured with security measures implemented to meet the needs of the
end users?
• Can the security risks be mitigated?
• Will the raspberry pi technique detect and prevent from Evil Twin Attack on the Wireless
Networks?
The following are the research questions:
• Will the robustness of detection improve?
• Can the raspberry pi be secured with security measures implemented to meet the needs of the
end users?
• Can the security risks be mitigated?
• Will the raspberry pi technique detect and prevent from Evil Twin Attack on the Wireless
Networks?
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
AIM
• The aim of this research includes improving the wireless network’s security against the
illegitimate APs. This needs identification of techniques that efficiently secures to mitigate the
risks of attacks on the wireless network. It’s results might include loss of confidential
information, which can be used for various fraudulent activities.
•
• The aim of this research includes improving the wireless network’s security against the
illegitimate APs. This needs identification of techniques that efficiently secures to mitigate the
risks of attacks on the wireless network. It’s results might include loss of confidential
information, which can be used for various fraudulent activities.
•
OBJECTIVES
This research’s objectives are:
• To build a raspberry pi which is connected with the wireless network, to identify and prevent it
from the evil twin attacks.
• To test the raspberry pi, to ensure that the implemented security measures meet the needs of the
end users.
• To recognize the security problems, which the users of wireless network bring up.
• To evaluate the overall research project.
This research’s objectives are:
• To build a raspberry pi which is connected with the wireless network, to identify and prevent it
from the evil twin attacks.
• To test the raspberry pi, to ensure that the implemented security measures meet the needs of the
end users.
• To recognize the security problems, which the users of wireless network bring up.
• To evaluate the overall research project.
LITERATURE REVIEW
• The preliminary literature review explains the existing researches and methods related to the
detection against the evil twin attacks. Then, the review concentrates mainly on finding the
solution for protection from the evil twin attacks. Further, the study provides the understanding
on how identifying and mitigating the risks are the important steps to prevent the network from
the unauthorised attacks. Thus, the importance of identifying the evil twin attacks is
determined. The previous related research on the research problem and their strength and
weakness and a justification of your research are determined. Therefore, this research ensures
to provide a simple mechanism for protecting and detecting the evil twin attacks.
• The preliminary literature review explains the existing researches and methods related to the
detection against the evil twin attacks. Then, the review concentrates mainly on finding the
solution for protection from the evil twin attacks. Further, the study provides the understanding
on how identifying and mitigating the risks are the important steps to prevent the network from
the unauthorised attacks. Thus, the importance of identifying the evil twin attacks is
determined. The previous related research on the research problem and their strength and
weakness and a justification of your research are determined. Therefore, this research ensures
to provide a simple mechanism for protecting and detecting the evil twin attacks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RESEARCH METHODOLOGY
• Literature review is the primary research method for this research work. The constraints are
identified and classified in a structured approach in two parts i.e., part 1 and part 2. The part 1
is executed on the AP side, and part 2 is implemented on the OS (operating system), where
even the Evil Twin attack is detected.
• Literature review is the primary research method for this research work. The constraints are
identified and classified in a structured approach in two parts i.e., part 1 and part 2. The part 1
is executed on the AP side, and part 2 is implemented on the OS (operating system), where
even the Evil Twin attack is detected.
PROPOSED WORK
• The proposed methodology is divided in two part as follows:
Part 1
• The process begins when the wireless client has a fake access point (AP). Because, it senses the
same AP name (SSID), the wireless client directs the request frame to that AP. Immediately,
when the AP receives the probe request frame it goes to the table and frisks for that SSID, if it
is present then it checks the corresponding MAC address and ‘TIME’. Later, it sends the
corresponding response frame to the wireless device with ‘TIME’ otherwise if SSID is not
present in the table then a new entry has to be made for that SSID with ‘TIME’ equal to zero,
which signifies that it belongs to ANL. Then, transmits the response frame
(SSID/BSSID/TIME) followed by which the Authentication and Association exchange takes
place. This ensures successfully establishing the connection. The flowchart in figure 1,
illustrates the described process.
• The proposed methodology is divided in two part as follows:
Part 1
• The process begins when the wireless client has a fake access point (AP). Because, it senses the
same AP name (SSID), the wireless client directs the request frame to that AP. Immediately,
when the AP receives the probe request frame it goes to the table and frisks for that SSID, if it
is present then it checks the corresponding MAC address and ‘TIME’. Later, it sends the
corresponding response frame to the wireless device with ‘TIME’ otherwise if SSID is not
present in the table then a new entry has to be made for that SSID with ‘TIME’ equal to zero,
which signifies that it belongs to ANL. Then, transmits the response frame
(SSID/BSSID/TIME) followed by which the Authentication and Association exchange takes
place. This ensures successfully establishing the connection. The flowchart in figure 1,
illustrates the described process.
PART 2
• This part is on the OS side and the process begins as soon as the probe response frame is
received by the OS. Then, it goes to the table that stores the SSID/BSSID/TIME of several APs
previously associated with it and searches for the SSID, where it actually tries to match it with
the equivalent BSSID and TIME. When each information matches, then it moves to the next
step, where connection is established. In case, if the information differs then it generates a
warning message that states, “Fake Access Point Detected.” Further, it doesn’t incorporate such
connection (Kumar, Raj and Paul, 2009).
• This part is on the OS side and the process begins as soon as the probe response frame is
received by the OS. Then, it goes to the table that stores the SSID/BSSID/TIME of several APs
previously associated with it and searches for the SSID, where it actually tries to match it with
the equivalent BSSID and TIME. When each information matches, then it moves to the next
step, where connection is established. In case, if the information differs then it generates a
warning message that states, “Fake Access Point Detected.” Further, it doesn’t incorporate such
connection (Kumar, Raj and Paul, 2009).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
F I G U R E : A U T H E N T I C AT I O N B E T W E E N T H E C L I E N T A N D G E N U I N E A P ( K U M A R , R A J A N D PA U L , 2 0 0 9 )
F I G U R E : A U T H E N T I C AT I O N B E T W E E N C L I E N T A N D FA K E A P ( K U M A R , R A J A N D PA U L , 2 0 0 9 )
SECURING THE LOCAL
SERVER
• The following steps must be followed to secure the local server:
• Block each access to the local network or the local internet gateway.
• Ensure only few ports are open to access the internet.
• From the local network, each client should have access to the SSH server.
• Block the invalid access requests that does not follow the normal TCP/IP protocol.
• Regularly change the domain user passwords.
• Protect the network devices with security solutons.
SERVER
• The following steps must be followed to secure the local server:
• Block each access to the local network or the local internet gateway.
• Ensure only few ports are open to access the internet.
• From the local network, each client should have access to the SSH server.
• Block the invalid access requests that does not follow the normal TCP/IP protocol.
• Regularly change the domain user passwords.
• Protect the network devices with security solutons.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
SUMMARY
• Regularly update the raspberry pi package.
• Install the package named, unattended-upgrades for automatic updates.
• Ensure changing the passwords on your devices.
• Make sure to avoid the pre-installed ready-to-go images. Check if the image or software you can installed
by yourself.
• The best option for the Pi is to have the DMZ segment/ the guest Wi-Fi network, as it exposes only the
services that you wish to be exposed to the Internet.
• Secure your device, if not it can be attacked by the hackers.
• If the Raspberry Pi project does not require connection to the internet, then don’t connect it, as it
eliminates the attack surface.
• Utilize defense with a multiple layers like the IP tables firewall.
• Ensure network security on both the client and server sides of the connection.
• Set up an intrusion detection system for providing the alerts when the hacker manages to get into the
network.
• Be aware of security alerts utilized in the Raspberry pi.
• Regularly update the raspberry pi package.
• Install the package named, unattended-upgrades for automatic updates.
• Ensure changing the passwords on your devices.
• Make sure to avoid the pre-installed ready-to-go images. Check if the image or software you can installed
by yourself.
• The best option for the Pi is to have the DMZ segment/ the guest Wi-Fi network, as it exposes only the
services that you wish to be exposed to the Internet.
• Secure your device, if not it can be attacked by the hackers.
• If the Raspberry Pi project does not require connection to the internet, then don’t connect it, as it
eliminates the attack surface.
• Utilize defense with a multiple layers like the IP tables firewall.
• Ensure network security on both the client and server sides of the connection.
• Set up an intrusion detection system for providing the alerts when the hacker manages to get into the
network.
• Be aware of security alerts utilized in the Raspberry pi.
REFERENCES
• Cisco. (2018). What Is a Wireless Network? - Wi-Fi Network. [online] Available at:
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/wireless-
network.html [Accessed 13 Dec. 2018].
• Kumar, A., Raj, B. and Paul, P. (2009). DETECTION AND PREVENTION AGAINST EVIL
TWIN ATTACK IN WLAN. International Journal of Computer Engineering and Applications,
Special Edition.
• Cisco. (2018). What Is a Wireless Network? - Wi-Fi Network. [online] Available at:
https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/wireless-
network.html [Accessed 13 Dec. 2018].
• Kumar, A., Raj, B. and Paul, P. (2009). DETECTION AND PREVENTION AGAINST EVIL
TWIN ATTACK IN WLAN. International Journal of Computer Engineering and Applications,
Special Edition.
T H A N K Y O U
1 out of 16
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.