ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detection and Correction of Wireless Vulnerabilities using Firewall Algorithms

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.5, No. 5)

Publication Date:

Authors : ; ;

Page : 102-105

Keywords : Wireless; Vulnerabilities; Firewall; Router;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

With recent technological advancements, every electronic device is wirelessly connected to the internet, and the internet as we all know is a network of systems and devices connected together. As the saying goes "A chain is only as strong as its weakest link", a network is also as strong as its weakest node. People today are making innumerable efforts to their systems secure from various threats, however the vulnerabilities arise not just in our systems, but also in the devices with which we are connected to the internet. Thus no matter how secure out systems are, if our routers are not well secured our systems are always vulnerable to attacks and our personal files and data is always at risk. A person with malicious intent would not even require to gain access to your system or attack your system to know what data you have stored in your system, all he needs to do is to tap into the router you are connected to and exploit its vulnerabilities to gain access to every data packet that is being sent by your system or received by it, and you wouldn't even know. The aim of this project is to detect and identify such vulnerabilities and to prevent such attacks from happening by trying to understand how a router works, how a firewall works and the possibility of integrating both of them to stop an attacker from gaining access to the router or any wireless connecting device.

Last modified: 2021-07-08 16:00:58