Wireless technology can now be seen almost everywhere. This technology has recently become very popular, and with the convenience that comes with its use, it will probably be the most commonly used technology among computer networks in the near future. Unfortunately, new technology is always under fire when it comes to security, which is a topic that has now become more imperative and indispensable when dealing with transferring and storing sensitive computer information. The realm of wireless technology is still new, and as it becomes more common among many types of computer networks, hackers or intruders will find more ways to intrude a wireless system. We will discuss why wireless networks are vulnerable to such intrusions. While the number of vulnerabilities and risks continue to rise, security engineers have attempted to slow and hope to eventually halt the many types of wireless network intrusions. A wireless network Intrusion Detection system (IDS) is a system for detecting such intrusions. Because of the multitude of methods of intrusions, there are several reasons why IDS is essential to any network, both wired and wireless. While the wireless IDS technology is new, we need to find out its capabilities and how it can help in providing a robust level of security for wireless networks. Additionally, we need to know what types of IDS are available and the drawbacks that come with using a wireless IDS.
CHAPTER ONE
INTRODUCTION TO STUDY
1.1 Introduction
There is no disputing the facts... the number of hacking and intrusion incidents is increasing year on year as technology rolls out. Unfortunately in todays inter-connected e-commerce world there is no hiding place: you can be found through a wide variety of means: DNS, Name Server Lookup, NSlookup, Newsgroups, web site trawling, e-mail properties and so on.
An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious
References: www-users.cs.york.ac.uk/~jac/PublishedPapers/AdhocNetsFinal.pdf retrieved 29 April, 2014 http://www.checkattacks.com> Anderson, Ross (2001). Security Engineering: A Guide to Building Dependable Distributed Systems. New York: John Wiley & Sons. Anderson, James P., "Computer Security Threat Monitoring and Surveillance," Washing, PA, James P. Anderson Co., 1980. Lunt, Teresa F., "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22–23, 1990. Amoroso, Edward, "Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response," Intrusion.Net Books, Sparta, New Jersey, 1999, Kohlenberg, Toby (Ed.), Alder, Raven, Carter, Dr