• Login
    View Item 
    •   Repository Home
    • Staff Publications
    • School of Computing & Informatics
    • View Item
    •   Repository Home
    • Staff Publications
    • School of Computing & Informatics
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A vulnerability model for wireless local area networks in an insecure wardriving setting

    Thumbnail
    View/Open
    AMOS C. KIRONGO.pdf (2.563Mb)
    Date
    2017
    Author
    Kirongo, Amos
    Metadata
    Show full item record
    Abstract
    Wireless local area networks (WLAN) enable access to computing resources for devices that are not physically connected to a network infrastructure. WLANs usually function in a restricted geographical location such as a workplace. They are effected as additions to current wired local area networks to improve operator movement. These networks require to be secured from vulnerabilities including eavesdropping which result from wardriving. The main goal is to understand how vulnerability of wireless networks in a wardriving setting can be mitigated through simulation of a vulnerability model using Artificial Neural Networks. It is with this understanding that nationally and internationally WLANs security is a priority with relation to data security. The Kenyan government in its vision focuses on the development of a National framework for Information and Cyber Security through a proactive approach to the country's security needs to ensure security of the upcoming National Next Generation Broadband network and securing of the proposed National Cloud computing platform for use by both private and public sectors. It also focuses on securing the implementation of the National Open Data and strategic Data Programme. The government is further investing in public key infrastructure to secure the national networks. With this in mind the researcher embarked on a survey based on the Vulnerability of WLANs in Meru Town of Meru County in Kenya. The survey revealed that most of the users of WLANs that had installed the networks had not secured their networks appropriately, since most were open, while others used default SSIDs. Further vulnerability of AP devices with relation to manufacturer popularity was identified with associated encryption modes. This research developed a conceptual framework for Wireless Local Area Networks Security management strategies in a wardriving setting and tested it founded on experimental substantiation. The newfangled model that was proposed provided a simulated vulnerability model to define and represent WLAN Security, an ANN model to aid network administrators in scheming wireless network security policies, and specific suggestions for more exploration. The enunciation of WLANs security, which is an addition to wired Local Area Networks, pursues explain the convolution related to the establishment and conveyance of online data and facilities from the institutions to the terminus that’s the client; students, staff and stakeholders.
    URI
    http://repository.must.ac.ke/handle/123456789/1015
    Collections
    • School of Computing & Informatics [66]

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository
     

     

    Browse

    All of the RepositoryCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    MUST Repository copyright © 2002-2016  MUST Repository
    Contact Us | Send Feedback
    Theme by 
    MUST Repository