Distributed Denial-of-Service
Briefly, DDoS is an attack in which a number of computers are connected to a centralized source using peer-to-peer networking, which allows them to send packets at extremely high rates. These packets are targeted at a single victim, which will eventually result in the victim’s inability to respond to requests. DDoS attacks can be launched by using multiple wireless devices with IEEE 802.1Q encryption. This type of encryption provides fast data rates and is used in exchange for its vulnerability to the following attack:
- The attacker connects to each wireless device individually and sends it a spoofed IP packet with its source address set to that of the target (victim). The AP receives this message and responds in kind, which results in a flood of traffic being sent directly to the victim.
- In order to mitigate DDoS attacks, you should implement a centralized wireless security solution to monitor and control.
How to Design Architecture for Enterprise Wireless Security?
Wireless networks are becoming very common in the enterprise, with many devices utilizing it as a primary communication method. Although these networks provide convenience and enhanced productivity, they also provide new opportunities for abuse and breaches of security. This is especially true when wireless devices are in proximity to people or computers that run on the traditional wired network. As such, organizations must be equipped with robust security controls to protect their wireless environment from potential threats and intruders. In order for effective enterprise defense strategies to be put in place, it’s important that we have a solid understanding of how wireless technologies interact with the wired network environment. In this article, we’ll discuss the similarities and differences between the two network architectures and break down the wireless security concerns that must be addressed in order to protect your wired network resources.
Contact Us