Wireless LAN Security 4.3 Wireless LAN Security.

Slides:



Advertisements
Similar presentations
Network Attacks. Topics Objectives Rogue Devices Rogue Infrastructure Hardware Placement Data Theft & Malicious Insertion Security Feature Weaknesses.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Wireless LANs Scaling Networks.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
1 15-May-15 S Ward Abingdon and Witney College Wireless CCNA Exploration Semester 3 Chapter 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Technologies Networking for Home and Small Businesses – Chapter 7.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Chapter 8: Wireless LANs
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 4: Wireless LANs Scaling Networks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Wireless LANs Switched Networks Assist. Prof. Pongpisit Wuttidittachotti,
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Wireless Networking.
Chapter 8 Connecting Wirelessly
Sybex CCNA Chapter 12: Wireless Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Lecture 11 Wireless security
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture 24 Wireless Network Security
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Sybex CCNA Chapter 14: Cisco Wireless Technologies Instructor & Todd Lammle.
Wireless security Wi–Fi (802.11) Security
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
Chapter-7 Basic Wireless Concepts and Configuration.
LOGO Wireless 25-Sep-16Jaringan Komputer_D3 TT_IT Telkom1.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
CCNA Exploration Semester 3 Chapter 7
Basic Wireless Concepts and Configuration Part II
CompTIA Security+ Study Guide (SY0-401)
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Wireless Protocols WEP, WPA & WPA2.
Methods of Securing LANs
WEP & WPA Mandy Kershishnik.
A Wireless LAN Security Protocol
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
CompTIA Security+ Study Guide (SY0-501)
Chapter 4: Wireless LANs
Wi-Fi Technology.
IEEE i Dohwan Kim.
Wireless Network Security
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Configure a Wireless Router
Configure a Wireless Router
Presentation transcript:

Wireless LAN Security 4.3 Wireless LAN Security

WLAN Threats Securing Wireless

WLAN Threats DoS Attack Wireless DoS attacks can be the result of: Improperly configured devices. Configuration errors can disable the WLAN. A malicious user intentionally interfering with the wireless communication. Disable the wireless network where no legitimate device can access the medium. Accidental interference  WLANs operate in the unlicensed frequency bands and are prone to interference from other wireless devices. May occur from such devices as microwave ovens, cordless phones, baby monitors, and more. 2.4 GHz band is more prone to interference than the 5 GHz band. 4.3.1.2 DoS Attack

WLAN Threats Management Frame DoS Attacks A spoofed disconnect attack  Occurs when an attacker sends a series of “disassociate” commands to all wireless clients. Cause all clients to disconnect. The wireless clients immediately try to re-associate, which creates a burst of traffic. A CTS flood  An attacker takes advantage of the CSMA/CA contention method to monopolize the bandwidth. The attacker repeatedly floods Clear to Send (CTS) frames to a bogus STA. All wireless clients sharing the RF medium receive the CTS and withhold transmissions until the attacker stops transmitting the CTS frames. 4.3.1.3 Management Frame Dos Attacks

WLAN Threats Rogue Access Points A rogue AP is an AP or wireless router that has been: Connected to a corporate network without explicit authorization and against corporate policy. Connected or enabled by an attacker to capture client data, such as the MAC addresses of clients (both wireless and wired), or to capture and disguise data packets, to gain access to network resources, or to launch man-in-the-middle (MITM) attacks. To prevent the installation of rogue APs, organizations must use monitoring software to actively monitor the radio spectrum for unauthorized APs. 4.3.1.4 Rogue Access Points

WLAN Threats Man-in-the-Middle Attack “Evil twin AP” attack: A popular wireless MITM attack where an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are hotbeds for this type of attack due to the open authentication. Connecting wireless clients would see two APs offering wireless access. Those near the rogue AP find the stronger signal and most likely associate with the evil twin AP. User traffic is now sent to the rogue AP, which in turn captures the data and forwards it to the legitimate AP. Return traffic from the legitimate AP is sent to the rogue AP, captured, and then forwarded to the unsuspecting STA. 4.3.1.4 Man-in-the-Middle Attack

Securing WLANs Wireless Security Overview Use authentication and encryption to secure a wireless network. 4.3.2.1 Wireless Security Overview

Securing WLANs Shared Key Authentication Methods

Securing WLANs Encryption Methods IEEE 802.11i and the Wi-Fi Alliance WPA and WPA2 standards use the following encryption protocols: Temporal Key Integrity Protocol (TKIP)  Used by WPA. Makes use of WEP, but encrypts the Layer 2 payload using TKIP, and carries out a Cisco Message Integrity Check (MIC). Advanced Encryption Standard (AES)  Encryption method used by WPA2. Preferred method because it aligns with the industry standard IEEE 802.11iA. Stronger method of encryption. Uses the Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP). Always choose WPA2 with AES when possible. 4.3.2.3 Encryption Methods

Securing WLANs Authenticating a Home User WPA and WPA2 support two types of authentication: Personal  Intended for home or small office networks, or authenticated users who use a pre-shared key (PSK). No special authentication server is required. Enterprise  Requires a Remote Authentication Dial-In User Service (RADIUS) authentication server. Provides additional security. Users must authenticate using 802.1X standard, which uses the Extensible Authentication Protocol (EAP) for authentication. 4.3.2.4 Authenticating a Home User

Securing WLANs Authentication in the Enterprise Enterprise security mode choices require an Authentication, Authorization, and Accounting (AAA) RADIUS server. . 4.3.2.5 Authentication in the Enterprise

Summary Wireless networks are specifically susceptible to threats such as wireless intruders, rogue APs, data interception, and DoS attacks. Cisco has developed a range of solutions to mitigate against these types of threats. Chapter 4 Summary