Title

Design for integrated WiFi defence strategy in mordern enterprise context

Document Type

Conference Proceeding

Publisher

IEEE Computer Society

Faculty

Faculty of Health, Engineering and Science

School

School of Computer and Security Science

RAS ID

19131

Comments

This article was originally published as: Zhong H., & Xiao J. (2014). Design for integrated WiFi defence strategy in mordern enterprise context. Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS. (pp. 748-753). Beijing, China. IEEE Computer Society. © 2014 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Original article available here

Abstract

WiFi has been adopted into enterprise production environment in larger scale, yet the flexibility of WiFi network also exposes more vulnerability to current security defense systems and introduces greater challenges to network security for modern enterprises. In wireless world, there are many dead corners that traditional firewall and intrusion detection system cannot cover. Modern enterprises are calling for more efficient defense approaches to guarantee the safety of the information on their wireless network. Upon probing to the weaknesses of current enterprise WiFi security, this paper proposes a defense strategy with the capacities of intelligent planning and integrated reactions to remedy the weaknesses of conventional enterprise security mechanism of WiFi network. A security defense system is designed to monitor WiFi security on Physical Layer, Data-link Layer and Internet Layer of the enterprise WiFi network, and provide attack defense mechanism to minimize the damage to enterprises when their WiFi network is under attack.

DOI

10.1109/ICSESS.2014.6933675

Access Rights

Not open access

Share

 
COinS