Improving Wireless Network Security Against Illegitimate APs using Raspberry Pi
Verified
Added on 2023/05/30
|16
|1470
|298
AI Summary
This research aims to improve wireless network security against illegitimate access points using Raspberry Pi. The research questions include improving detection robustness, securing Raspberry Pi, mitigating security risks, and detecting and preventing Evil Twin Attacks on wireless networks.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
C O M P U T E R&N E T W O R K S S E C U R I T Y
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
INTRODUCTION •The raspberry Pi boards are effective for any project due to its cost effectiveness, easy usage, various programmable GPIO pins, various USB port and CPU availability. •The raspberry pi can be utilized for all types of automation and information gathering. •Raspberry pi can be hacked. •Thus, it is essential to secure the raspberry pi and the other connected devices on the network. •The hackers are interested in hacking the raspberry pi, because it is an entry point for the internal network, which could be used for attacking the other hosts. •Moreover, its computing power could be abused for operations such as mining cryptocurrency. •The attackers can easily collect the file servers, install ransomware, make changes to the firewall and the settings of router for ensuring continuous access, to perform harmful actions in the future.
INTRODUCTION •The lack of wireless Network’s security is known when an individual is connected to the network (Cisco, 2018). •For example, the cafes such as Starbuck and Macdonald are the places where the attacker tries to carry out the man-in-the-middle attacks. •The attacker make sure to set up a spoof Wi-Fi AP that looks similar to the legitimate network, but it captures the traffic and collects confidential information, for performing fraudulent activities. •Therefore, this research work improves the security of wireless network against illegitimate access point. •It needs to identify the techniques that effectively prevent or mitigate the attacks on the wireless network.
RESEARCH QUESTIONS The following are the research questions: •Will the robustness of detection improve? •Can the raspberry pi be secured with security measures implemented to meet the needs of the end users? •Can the security risks be mitigated? •Will theraspberry pitechnique detect and prevent from Evil Twin Attack on the Wireless Networks?
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
AIM •The aim of this research includes improving the wireless network’s security against the illegitimate APs. This needs identification of techniques that efficiently secures to mitigate the risks of attacks on the wireless network. It’s results might include loss of confidential information, which can be used for various fraudulent activities. •
OBJECTIVES This research’s objectives are: •To build a raspberry pi which is connected with the wireless network, to identify and prevent it from the evil twin attacks. •To test the raspberry pi, to ensure that the implemented security measures meet the needs of the end users. •To recognize the security problems, which the users of wireless network bring up. •To evaluate the overall research project.
LITERATURE REVIEW •The preliminary literature review explains the existing researches and methods related to the detection against the evil twin attacks. Then, the review concentrates mainly on finding the solution for protection from the evil twin attacks. Further, the study provides the understanding on how identifying and mitigating the risks are the important steps to prevent the network from the unauthorised attacks. Thus, the importance of identifying the evil twin attacks is determined. The previous related research on the research problem and their strength and weakness and a justification of your research are determined. Therefore, this research ensures to provide a simple mechanism for protecting and detecting the evil twin attacks.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH METHODOLOGY •Literature review is the primary research method for this research work. The constraints are identified and classified in a structured approach in two parts i.e., part 1 and part 2. The part 1 is executed on the AP side, and part 2 is implemented on the OS (operating system), where even the Evil Twin attack is detected.
PROPOSED WORK •The proposed methodology is divided in two part as follows: Part 1 •The process begins when the wireless client has a fake access point (AP). Because, it senses the same AP name (SSID), the wireless client directs the request frame to that AP. Immediately, when the AP receives the probe request frame it goes to the table and frisks for that SSID, if it is present then it checks the corresponding MAC address and ‘TIME’. Later, it sends the corresponding response frame to the wireless device with ‘TIME’ otherwise if SSID is not present in the table then a new entry has to be made for that SSID with ‘TIME’ equal to zero, whichsignifiesthatitbelongstoANL.Then,transmitstheresponseframe (SSID/BSSID/TIME) followed by which the Authentication and Association exchange takes place. This ensures successfully establishing the connection. The flowchart in figure 1, illustrates the described process.
PART 2 •This part is on the OS side and the process begins as soon as the probe response frame is received by the OS. Then, it goes to the table that stores the SSID/BSSID/TIME of several APs previously associated with it and searches for the SSID, where it actually tries to match it with the equivalent BSSID and TIME. When each information matches, then it moves to the next step, where connection is established. In case, if the information differs then it generates a warning message that states, “Fake Access Point Detected.” Further, it doesn’t incorporate such connection (Kumar, Raj and Paul, 2009).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
F I G U R E : A U T H E N T I C AT I O N B E T W E E N T H E C L I E N T A N D G E N U I N E A P ( K U M A R , R A J A N D PA U L , 2 0 0 9 )
F I G U R E : A U T H E N T I C AT I O N B E T W E E N C L I E N T A N D FA K E A P ( K U M A R , R A J A N D PA U L , 2 0 0 9 )
SECURING THE LOCAL SERVER •The following steps must be followed to secure the local server: •Block each access to the local network or the local internet gateway. •Ensure only few ports are open to access the internet. •From the local network, each client should have access to the SSH server. •Block the invalid access requests that does not follow the normal TCP/IP protocol. •Regularly change the domain user passwords. •Protect the network devices with security solutons.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
SUMMARY •Regularly update the raspberry pi package. •Install the package named, unattended-upgrades for automatic updates. •Ensure changing the passwords on your devices. •Make sure to avoid the pre-installed ready-to-go images. Check if the image or software you can installed by yourself. •The best option for the Pi is to have the DMZ segment/ the guest Wi-Fi network, as it exposes only the services that you wish to be exposed to the Internet. •Secure your device, if not it can be attacked by the hackers. •If the Raspberry Pi project does not require connection to the internet, then don’t connect it, as it eliminates the attack surface. •Utilize defense with a multiple layers like the IP tables firewall. •Ensure network security on both the client and server sides of the connection. •Set up an intrusion detection system for providing the alerts when the hacker manages to get into the network. •Be aware of security alerts utilized in the Raspberry pi.
REFERENCES •Cisco. (2018).What Is a Wireless Network? - Wi-Fi Network. [online] Available at: https://www.cisco.com/c/en/us/solutions/small-business/resource-center/networking/wireless- network.html [Accessed 13 Dec. 2018]. •Kumar, A., Raj, B. and Paul, P. (2009). DETECTION AND PREVENTION AGAINST EVIL TWIN ATTACK IN WLAN.International Journal of Computer Engineering and Applications, Special Edition.