WIRELESS INTRUSION DETECTION SYTEMS

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Guide to Network Defense and Countermeasures Second Edition
Security+ Guide to Network Security Fundamentals
1.  To analyze and explain the IDS placement in network topology  To explain the relationship between honey pots and IDS  To explain, analyze and evaluate.
Presented by Serge Kpan LTEC Network Systems Administration 1.
IS Network and Telecommunications Risks
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
CCNA Exploration Semester 3 Modified by Profs. Ward and Cappellino
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
NETWORK SECURITY.
John Felber.  Sources  What is an Intrusion Detection System  Types of Intrusion Detection Systems  How an IDS Works  Detection Methods  Issues.
Host Intrusion Prevention Systems & Beyond
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Intrusion Detection Systems CS391. Overview  Define the types of Intrusion Detection Systems (IDS).  Set up an IDS.  Manage an IDS.  Understand intrusion.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Presented by: Dr. Munam Ali Shah
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless Intrusion Prevention System
Lecture 24 Wireless Network Security
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Lab #2 NET332 By Asma AlOsaimi.
SIEM Rotem Mesika System security engineering
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
CompTIA Security+ Study Guide (SY0-401)
CSCE 548 Student Presentation By Manasa Suthram
Working at a Small-to-Medium Business or ISP – Chapter 8
(A CORPORATE NETWORK APPROACH)
NETWORKS Fall 2010.
Secure Software Confidentiality Integrity Data Security Authentication
Computer Data Security & Privacy
Wireless Network Security
CompTIA Security+ Study Guide (SY0-401)
Goals Introduce the Windows Server 2003 family of operating systems
WLAN Security Antti Miettinen.
Intrusion Detection system
Introduction to Network Security
LM 5. Wireless Network Security
Presentation transcript:

WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy

THREATS VICTIMS IDS TYPES OF IDS ARCHITECTURE IMPLEMENTATION TOOLS USED ADMINISTRATION

THREATS Reconnaissance, theft of identity and denial of service (DoS) Signal range of authorized AP. Physical security of an authorized AP Rogue or unauthorized AP Easy installation of an AP Poorly configured AP Protocol weakness and capacity limits on AP

What are attacked? Corporate network and servers Attempted penetration through the official access points(target 1) into the corporate network. DOS attacks as most of them are TCP/IP based Wireless Clients the Access point behaves as a hub connecting the authorized wireless clients directly to the bad buys inevitably this will expose a connecting pc to a huge array of IP based attack.

Unauthorized Access point Unofficial access points installed by user departments (target 4) represent a huge risk as the security configuration is often questionable Bogus Access points (Target 5) represent a different threat as these can be used to hijack sessions at the data link layer and steal valuable information. o Target 3 – The legitimate Access point

To protect our network where all access points reside on our network what actions to take to close down any unauthorized access points that do not confirm to the company security standards what wireless users are connected to our network what unencrypted data is being accessed and exchanged by those users

What is IDS? IDS is not a firewall IDS watch network from the inside and report or alarm IDS monitors APs ,compares security controls defined on the AP with predefined company security standards then reset or closedown any non-conforming AP’s they find. IDS identifies,alerts on unauthorized MAC addresses ,tracks down hackers.

Intrusion detection systems are designed and built to monitor and report on network activities, or packets, between communicating devices. Many commercial and open source tools are used: TOOLS capture and store the WLAN traffic, analyse that traffic and create reports analyse signal strength and transmission speed

ID SYSTEM ACTIVITIES

INFRASTRUCTURE

ARCHITECTURE

IDS : a sensor (an analysis engine) that is responsible for detecting intrusions (contains decision making mechanism) Sensor recevies message from own IDS knowledge base, syslog and audit trails. Syslog may include, for example, configuration of file system, user authorizations etc. This information creates the basis for a further decision-making process.

TYPES OF IDS Misuse or Anomaly IDS Network based or Host based IDS Passive or Reactive IDS

ARCHITECTURE CENTRALIZED : combination of individual sensors which collect and forward 802.11 data to a centralized management system. DISTRIBUTED : one or more devices that perform both the data gathering and processing/reporting functions if various IDS

Distributed is best suited for smaller WLANS due to cost and management issues Cost of many sensors with data processing Management of multiple processing/reporting sensors

In centralized, it is to easy to maintain only one IDS where all the data is analyzed and formatted. Single point of failure Adds to ‘additional’ network traffic running concurrently, impact on network performance

IMPLEMENATION OF IDS Comprises of a mixture of hardware and software called intrusion detection sensors. Located on the network and examines traffic. Where the sensors should be placed??!! How many do wee need??!!

Not just to detect attackers.. Helps to Enforce Policies Polcies for encryption Can report if a un encrypted packet is detectet. With proper enforcement WEP can be acchieved (next slide)

Why do we need these To achieve WEP What's WEP? Wired Equivalent Privacy Why do we need it?

People responsible IDS security analysts who can interpret the alerts (Passive IDS). IDS software programmers IDS database administrators (misuse or anomaly IDS)

Couple of open source IDS KISMET 802.11 a/b/g network sniffer NETSTUMBLER

Kismet 802.11a/b/g network sniffer Passively collects network traffic(listens), detects the standard named networks and detecting hidden (non beaconing) networks Analyze the data traffic and build a ‘picture’ of data movement

NetStumbler Sends 802.11 probes Actively scans by sending out request every second and reporting the responses AP’s by default respond to these probes Used for wardriving or wilding.

Who manages and administers WIDS? Large organization (Network Operations group) AirMagnet Distributed 4.0, AirDefense Enterprise v4.1 Red-M Small and Medium Organization Managed Security Service Provider (MSSP)

AirMagnet Distributed Sensors report network performance information Alerts management server Airmagnet reporter generates reports from threat summaries to channel RF signal strength Ex: Using ‘Find’ tool, we can manually and physically track down location of the rogue user

AirDefense AirDefense system consists of a server running Red Hat Linux with distributed wireless AP sensors and a Java-based Web console. The AirDefense Web console and AP sensors communicate on a secure channel to the server

Red-M Red-M includes Red-Alert and Red-Vision. Red- Alert is a standalone wireless probe which can detect unauthorized Bluetooth devices as well as 802.11a/b/g networks. Red-Vision ss a modular set of products consisting of three main components: Red-Vision Server, Red-Vision Laptop Client and Red-Vision Viewer.

Red Vision (cont) Red vision server (Heart) Red vision laptop client (Ear) Red Vision viewer ( Brain)

Wireless IDS drawbacks Cost Cost grows in conjunction with size of the LAN New emerging technology and hence may contain many bugs and vulnerabilities. A wireless IDS is only as effective as the individuals who analyze and respond to the data gathered by the system

Conclusion Wireless intrusion detection systems are an important addition to the security of wireless local area networks. While there are drawbacks to implementing a wireless IDS, the benefits will most likely prove to outweigh the downsides

QUESTIONS What is Policy Enforcement ? A policy is stated by IDS (Ex: all wireless communications must be encrypted) to detect the attack What type of ID is AirDefense Guard? It is misuse or signature based anomaly. What are ‘dumb’ probes? They collect all the network traffic and send it to central server for analyses

REFERENCES http://www.telecomweb.com/readingroom/Wireless_Intrusion_Detection.pdf http://www.giac.org/certified_professionals/practicals/gsec/4210.php http://www.sans.org/rr/whitepapers/wireless/1543.php http://www-loud-fat-bloke.co.uk/articles/widz-design.pdf

QUESTIONS?

THANKYOU