Development model Wi-Fi netvork for intrusion prevention

Authors

DOI:

https://doi.org/10.15587/1729-4061.2014.20075

Keywords:

wireless network, Wi-Fi network model, security

Abstract

The model structure, which emulates the operation of a wireless Wi-Fi network and takes into account a possibility of intrusions, disruptions and interferences using the Delphi software application, designed solely for testing the offered algorithms of its protection, based on a fuzzy logic, is proposed in the paper.

The functions of existing modeling systems, their advantages and disadvantages were analyzed. It was concluded that formerly created software programs are not suitable for this task, so the problem of developing a special model, which emulates the Wi-Fi network operation, designed solely for testing the offered algorithms of its protection, is topical today.

The main modeling stages are further considered in the paper. At the first stage, the wireless network operation, implemented by means of a centralized coordination function, is considered. The operation algorithms for separate data transmit/receive sections are given. The procedures, specified by the algorithm, are virtually carried out on different devices. For implementing all algorithms on a computer, they were divided into several non-simultaneous procedures.

At the second stage of modeling, the implementation of intruders’ actions is studied. Security threats of wireless networks are considered in detail. Common attacks along with the software implementation such improper activities in the model are described.

Author Biographies

Иван Евгеньевич Антипов, Kharkiv National University of Radio Electronics Lenina 14, Kharkov, Ukraine, 61166

Professor

Department of Radioelectronic devices

Татьяна Александровна Василенко, Kharkiv National University of Radio Electronics Lenina 14, Kharkov, Ukraine, 61166

Postgraduate

Department of Radioelectronic devices

Иван Викторович Михеев, Kharkiv National University of Radio Electronics Lenina 14, Kharkov, Ukraine, 61166

Student

Department of Radioelectronic devices

References

  1. Антипов, И. Е. Применение нечеткой логики для повышения безопасности беспроводных сетей на базе технологии Wi-Fi [Текст] / И. Е. Антипов, Т. А. Ященко, Нух Таха Насиф. // Радиотехника: Всеукр. межвед. научн.-техн. сб. 2011 Вып. 165. С. 103-106.
  2. Антипов, И. Е. Применение теории игр для защиты беспроводных wi-fi сетей [Текст] / И. Е. Антипов, Т. А. Ященко, В. С. Вовченко. // Радиотехника: Всеукр. межвед. научн.-техн. сб. 2013 Вып. 173. С. 104-107.
  3. TamoGraph® Site Survey [Электронный ресурс]. Режим доступа: http:// http://www.tamos.com.
  4. AirMagnet Planner [Электронный ресурс]. Режим доступа: http:// http://www.keenansystems.com.
  5. Network simulation [Электронный ресурс]. Режим доступа: http:// http:// http://en.academic.ru.
  6. SimulationTools.bib [Электронный ресурс]. Режим доступа: http:// http:// http:// http://www.idsia.ch.
  7. Пролетарский, А. В. Беспроводные сети Wi-Fi [Текст] / А.В. Пролетарский, И. В. Баскаков, Д. Н. Чирков. – БИНОМ. Лаборатория знаний, 2007. – 178 с.
  8. Джим Гейер. Беспроводные сети. Fi [Текст] / Джим Гейер. – М.: Издательский дом «Вильямс», 2005. – 192 с.
  9. Kaspersky Security Bulletin. Развитие угроз в 2008 году [электронный ресурс] Режим доступа: http:// www.securelist.com.
  10. Шаньгин, В. Ф. Информационная безопасность компьютерных сетей и систем [Текст] / В. Ф. Шаньгин. – М.: ИД «ФЩРУМ» - ИНФРА-М, 2008. – 416 с.
  11. Antipov, I. E., Vasilenko, Т. А., Mikheev, I. V. (2011). Primenenie nechetkoy logiki dlya povyisheniya bezopasnosti besprovodnyih setey na baze tehnologii Wi-Fi. Radioengineering, 165, 103-106.
  12. Antipov, I. E., Vasilenko, Т. А., Vovchenko, V. S. (2013). Primenenie teorii igr dlya zaschityi besprovodnyih wi-fi setey. Radioengineering, 173, 104-107.
  13. TamoGraph Site Survey. Available at: http:// http://www.tamos.com.
  14. AirMagnet Planner. Available at: http:// http://www.keenansystems.com.
  15. Network simulation. Available at: http:// http:// http://en.academic.ru.
  16. SimulationTools.bib. Available at: http:// http:// http:// http://www.idsia.ch.
  17. Proletarskiy, A. V. (2007). Besprovodnye seti Wi-Fi. BINOM. Laboratoriya znaniy, 178.
  18. Dzhim, Geyer (2005). Besprovodnye seti Wi-Fi. Izdatelskiy dom «Vilyams», 192.
  19. Kaspersky Security Bulletin. Razvitie ugroz v 2008 godu. Available at: http:// www.securelist.com.
  20. Shangin, V. F. (2008). Informatsionnaya bezopasnost kompyuternyih setey i sistem. ID «FSCHRUM» - INFRA-M, 416.

Published

2014-02-05

How to Cite

Антипов, И. Е., Василенко, Т. А., & Михеев, И. В. (2014). Development model Wi-Fi netvork for intrusion prevention. Eastern-European Journal of Enterprise Technologies, 1(9(67), 4–8. https://doi.org/10.15587/1729-4061.2014.20075

Issue

Section

Information and controlling system