چكيده به لاتين
One of the most important of needfulness in the wireless networks is security. The importance of the security through the wireless networks is demanded, hence there are diversity of methods have been utilized until now. Different solutions such as firewall, authentication, and encryption have not been sufficient. So, for vulnerable points, intrusion detection systems and their response in different frames are the most important function. The definition of “intrusion” is, various activities which have the aim of compromising integrity, system reliability, and illegal access to specific source. According to previous studies, there were many great effort on developing defining systems, prevent of intrusion and their response in the wireless networks but recently searches show that they have not been sufficient. One of the vulnerable points in the IEEE 802.11X protocol is sending management packages through the channel without encryption. The majorities of wireless network attacks have two steps for being successful, firstly, broke victim loop from legitimate access point and secondly, connected victim to forged access point. Based on victim and attacker features, different situation will be occur between this two steps and each situation has own danger. In this study, attacking was identified and tried to find contemporary solution based on every situations. The features of response consist of operating level, speed and time of response, ability of training, and ability of cooperating with other devices.The initial suggested response method is used to channel exchange policy. With this method the clean ping and sufficient bandwidth are increased about 10%. The Response rate and disassociation of the post time have been had positive effect by running different scenarios. The most sufficient response method is that a attacker dose not know about the new channel that have been changed. After all, the victim and legitimate access point are equipped with the special module so they can move to the new channel, when the new channel was created. Therefore, the attacker will connect lately and the sufficient bandwidth stay in good status and has 10% increasment in compare with basic state. The bandwidth was used insufficiently by attackers does not change widely is the main point of all mentioned methods and also the qualified bandwidth will has been increased.
Keywords: Security; wireless network, channel, attack, intrusion prevetation, intrusion response system, Man in the Middle Attack.