09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Passive attacks are mostly undetectable by network administrators and physical<br />

network devices due to the passiveness <strong>of</strong> this activity (Curran & Smyth, 2005; Welch<br />

& Lathrop, 2003).<br />

2.5.1.2 Active Attack<br />

Shimonski (2003) stated that the activity <strong>of</strong> passive attacks could accumulate enough<br />

information leading attackers to actively attack a wireless network. The main target <strong>of</strong><br />

active attackers is usually to gain access to a network and then change or modify the<br />

resource’s content (J. Wong, 2003). Two activities that can be categorized as active<br />

attacks are unauthorized access and spo<strong>of</strong>ing (Shimonski, 2003). Active eavesdropping<br />

requires injection <strong>of</strong> data by the attacker into the communication session in order to<br />

decipher the payload. In this process, the attacker will listens to the wireless connection<br />

while actively injects messages into the communication session in order to determine<br />

the contents <strong>of</strong> the messages. Active attacks can happen in two ways, the first is when<br />

the attacker modifies a packet. Secondly is when the attackers inject completely new<br />

packets into the data stream (Welch & Lathrop, 2003). Actively attacking the network<br />

can caused the denial <strong>of</strong> service attack to the WLAN.<br />

2.5.1.3 Denial <strong>of</strong> Service (DoS attack)<br />

The denial <strong>of</strong> service attack or sometimes referred to as DoS attack is an effort by<br />

attackers to make a computer resource unavailable to its anticipated users. The<br />

seriousness <strong>of</strong> this attack is it can cause the network to slow down to a point <strong>of</strong> being<br />

unusable (Maple, Jacobs, & Reeve, 2006). Even though the motives for DoS attacks, the<br />

means to conduct it, and the targets <strong>of</strong> such attack varies, it still involves a rigorous and<br />

malicious efforts by the attacker (s) trying to prevent the WLANs services from<br />

functioning properly (Carli, Rosetti, & Neri, 2003). Woodward (2005) explained that<br />

the attack can be attempted in two ways. The first way to conduct the DoS attack is<br />

through the jamming technique which is quite easy to implement and not easily detected.<br />

This attack can cause serious interference to the WLAN when done intentionally or<br />

unintentionally such as placing a device that operates at the same frequency in the<br />

same area as the WLANs. The second way for DoS attack to be done is by exploiting<br />

the authentication and encryption weaknesses that exist within the 802.11 itself (Aime,<br />

Lioy, & Mazzocchi, 2004). In this attack the wireless node is forced to rejoin the<br />

WLANs where the logon and authentication details can be captured while the node is<br />

re-associating itself with the AP. The information gathered from this attacks can also<br />

lead to another problem, the man in the middle attack (Woodward, 2005).<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!