09.11.2012 Views

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

AIS300 - Scheme of Work - Scholarly Commons Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

network so that other malicious users cannot read the transmitted messages (Hole,<br />

Dyrnes, & Thorsheim, 2005).<br />

VPN is a service that proposes a reliable and secure connection over a shared public<br />

infrastructure such as WLAN hotspot. It is also a security method that provides an<br />

encrypted connection between private networks and a public network. VPN used IPSec<br />

(IP Security) to provide confidentiality, data integrity, authentication and anti-replay<br />

protection (Laet & Schauwers, 2005). VPN works by creating a point-to-point<br />

connection between a user and a server that act as a tunnel to the public network.<br />

Various encryption techniques are being applied in this process which ensures that only<br />

the legitimate entity at each end <strong>of</strong> the VPN tunnels can read the transmitted messages<br />

(Hole, Dyrnes, & Thorsheim, 2005).<br />

Virtual private network have been used in a wired LAN environment to protect<br />

remote users when dialing up into a corporate server or the intranet. It forces all<br />

traffic to go through an encrypted tunnel in order to access the corporate network which<br />

then provides an added security to the network (Woodward, 2005). How VPN works is<br />

by having one end <strong>of</strong> the tunnel with the VPN server s<strong>of</strong>tware running on the<br />

company’s computer and on the other end <strong>of</strong> the tunnel a VPN s<strong>of</strong>tware client running<br />

on the employee’s laptop. When an employee requests to connect to the network, the<br />

VPN server will then open a port in the firewall which allows intranet access for that<br />

employee through the VPN tunnel. However, VPN is still vulnerable to attacks if not<br />

implemented correctly. Hacking tools such as crackerjack can be utilize to evade a<br />

VPN and capture the network traffic via a man in the middle attack (Woodward, 2005).<br />

5.2.5 Apply Wireless Intrusion Detection System (IDS)<br />

Wireless intrusion detection system (IDS) is a network monitoring s<strong>of</strong>tware that could<br />

be utilized in monitoring abnormal activity occurring in the WLAN as well as<br />

unauthorized devices presenting in the network (Laet & Schauwers, 2005; Shridhar,<br />

Joyce, & Kolahi, 2005; Woodward, 2005). Intrusion detection systems are developed to<br />

detect abnormal behaviors <strong>of</strong> networks and information systems, indicating<br />

infringement <strong>of</strong> the security policy. The analysis techniques implemented by most IDS<br />

are misuse-detection and anomaly detection. Misuse-detection analysis is to detect<br />

known security policy violation, while anomaly detection analysis is to detect<br />

divergence <strong>of</strong> normal systems behavior (Debar, 2004). Therefore IDS functions<br />

38

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!