26.07.2013 Views

WiMax Operator's Manual

WiMax Operator's Manual

WiMax Operator's Manual

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

192 CHAPTER 9 ■ NETWORK SECURITY<br />

approaches. But currently, encryption remains a powerful preventive tool for the security<br />

administrator.<br />

Finally, within the arsenal of defensive procedures, some software engines are designed<br />

not only to detect malicious code but also to prevent its effects by restoring network data to its<br />

state just prior to the detection of suspicious activity. Such software is a fairly new development,<br />

and it may not be entirely effective against all conceivable attacks.<br />

Authentication is sometimes considered a part of security and sometimes just a part of<br />

routine network operations. In a wireless network authentication, the process by which network<br />

users demonstrate that they are who they purport to be is especially important because<br />

the physical layer of the network is essentially open. Authentication today is normally performed<br />

in specialized servers, most of which now run Radius software.<br />

Safeguarding Network Elements from Hijacking and<br />

Malicious Code: Best Practices<br />

Securing network elements is, of course, vital to the integrity of the operation. While direct<br />

attacks on equipment operating systems intended to disable networks for lengthy intervals are<br />

not at all commonplace, intrusions into management systems have occurred in the past and<br />

undoubtedly will occur in the future. Obviously, they should be prevented at all costs. Unfortunately,<br />

many of today’s network elements are more vulnerable than the telco “big iron” of<br />

the past. Telephone circuit switches and asynchronous transfer mode (ATM) switches generally<br />

utilized some variant of Unix as an operating system and involved extremely arcane code<br />

that few hackers ever mastered. Indeed, most of the people who successfully hacked into<br />

telephone central offices were experienced individuals working in telecommunications. In<br />

contrast, many network devices manufactured today use open or commonly understood platforms<br />

such as Linux, Windows NT, or Java. They may incorporate some type of software<br />

firewall to thwart intruders, but they are not inherently difficult to understand or manipulate.<br />

And because wireless transmissions can be physically intercepted with great ease, there is little<br />

physical layer security possible in the network, and the network operator must remain largely<br />

dependent on specialized security software.<br />

The danger is compounded because most equipment today is designed to permit remote<br />

management by an authorized network administrator from a supposedly secure Web site.<br />

Obviously, that greatly eases the job of network administrators, enabling them to respond to<br />

problems in the network anywhere and at any time without having to visit the central office.<br />

However, if the administrator can access the OSS suite, then so can a hacker—if that individual<br />

can get past whatever security measures are in place. Accordingly, the network operator must<br />

make certain that there are no “trap doors” permitting entry into the management system that<br />

bypass authentication measures.<br />

Denial-of-Service Attacks: A Special Case<br />

Denial-of-service (DoS), or flooding attacks, have been used for many years by hackers. They<br />

are launched by capturing a large number of terminals and using them to transmit meaningless<br />

messages that flood the public network affected beyond its carrying capacity.<br />

DoS attacks are different from viruses and worms. They do not introduce malicious<br />

code into network elements or management software, and they are transitory in their effects.<br />

And yet they can shut down a network effectively for hours. Recently several vendors have

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!