Distributed Hash-table (Hashing)
Hashing is an attack in which the attacker computes a hash value based on the data being transmitted. If the hash value matches that of a preconfigured table, then a denial of service may occur. This type of attack comes in two varieties:
- Distributed Collision-Based Attacks (DCBA)
- Distributed Hashing-based Attack (DHBA)
Unlike the case with DCBA, where collisions are expected between APs due to their limited number of slots in IEEE 802.
How to Design Architecture for Enterprise Wireless Security?
Wireless networks are becoming very common in the enterprise, with many devices utilizing it as a primary communication method. Although these networks provide convenience and enhanced productivity, they also provide new opportunities for abuse and breaches of security. This is especially true when wireless devices are in proximity to people or computers that run on the traditional wired network. As such, organizations must be equipped with robust security controls to protect their wireless environment from potential threats and intruders. In order for effective enterprise defense strategies to be put in place, it’s important that we have a solid understanding of how wireless technologies interact with the wired network environment. In this article, we’ll discuss the similarities and differences between the two network architectures and break down the wireless security concerns that must be addressed in order to protect your wired network resources.