802.11 Networks: hotspot security Nguyen Dinh Thuc University of Science, HCMC

Slides:



Advertisements
Similar presentations
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Advertisements

Security Issues In Mobile IP
Computer Networking Components Chad DuBose ~ Assignment #3 ~ LTEC
ARP AND RARP ROUTED AND ROUTING Tyler Bish. ARP There are a variety of ways that devices can determine the MAC addresses they need to add to the encapsulated.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Doc.: IEEE /2441r2 Submission SA Teardown Protection for w Date:
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Wired Equivalent Privacy (WEP)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
IP Routing: an Introduction. Quiz
IEEE Wireless LAN Standard
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
Networking Components Chad Benedict – LTEC
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
WLAN What is WLAN? Physical vs. Wireless LAN
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Networks: known attacks: technical review Nguyen Dinh Thuc University of Science, HCMC
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
CWNA Guide to Wireless LANs, Second Edition
IP Forwarding.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Connecting The Network Layer to Data Link Layer. ARP in the IP Layer The Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) Part.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal Speaker : Po-Kang Chen Advisor : Quincy Wu Date : 2010/06/13.
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Natalie Podrazik – CS 491V – “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Natalie Podrazik April.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
IEEE Wireless LAN Standard
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 6 Building a Home Network
Wireless LAN Security 4.3 Wireless LAN Security.
Chapter 6 Medium Access Control Protocols and Local Area Networks
Seminar class presentation Student: Chuming Chen & Xinliang Zheng
WLAN Security Antti Miettinen.
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Antti Miettinen (modified by JJ)
Computer Networks ARP and RARP
Presentation transcript:

Networks: hotspot security Nguyen Dinh Thuc University of Science, HCMC

Introduction wireless LAN Wired LAN Wireless LAN Laptop Laptop Access Point Mobile Pocket PC Palm Internet

Introduction wireless securityAuthentication Privacy Integrity Availability

Availability 4 Defending against Dising attacks Determining hot-IPs

Dising attacks on networks: Introduction In the current IEEE standards, whenever a wireless station wants to leave the network, it sends a deauthentication or disassociation frame to the access point. These two frames, however, are sent unencrypted and are not authenticated by the access point. Therefore, an attacker can launch a DoS attack by spoofing these messages and thus disabling the communication between these wireless devices and their access point.

Dising attacks on networks: Farewell attacks To break the communication between STAs and their AP, an attacker can simply send out a spoofed deauthentication or disassociation frame. There are a number of tool that enable an attacker to spoof the source MAC address of any device, such as: Spoof-MAC, Airsnarf, Mac Changer. Note that attacker spoofs a deauthentication or a disassociation frame of AP with broadcast destination MAC address, the effectively all STAs associated to the AP will be disconnected. The Farewell attack is simple but can cause serious damage, because the attacker can stop the communication using only limited resources without requiring any special technical skill. Bellardo et al. implement the attacks and show that this attack is simple and effective. J. Bellardo and S. Savage Denial-of-Service attacks: real vulnerabilities and pratical solutions. In Proceedings of the 12 th conference on USENIX Security Symposium, pages 18-25, Washington, DC, 2003.

Dising attacks on networks: Some of Defending Solutions Approach: eliminating the deauthentication and disassociation frames, or enqueueing them for a fix interval of time (for instance, 10 seconds) Issues: there may be a period of time where a STA associates with multiple APs concurrently, which may cause routing/handoff problems Approach: using Reverse Address Resolution Protocol (RARP) to detect spoofed frames Issues: the attackers may spoof the IP address of the client to break the RARP. Approach: detecting spoofed frames based on frame sequence number Issues: the attacker may sniff the frames sent by the client to predict the sequence number of the next frame. Approach: developing a lightweight authentication protocol for management frames, such as using 1 bit for authentication. Issues: errors in wireless medium may break the authentication, and the probability of an attacker to guess the authentication bit correctly is high (50%)

Dising attacks on networks: letter-envelop protocol The protocol works based on a one-way function f(.): given y = f(x), it is computationally infeasible to compute x; However, given x, it is easy to compute N. The Letter-envelop protocol is as follows: 1. Initially, STA randomly generates x 1, then computes y 1 = f(x 1 ). Similarly, AP generates x 2 and computes y 2 = f(x 2 ). 2. During the authentication process between STA and AP, STA sends y 1 to the AP, and AP sends y 2 to the STA. 3.When the STA wants to disconnect from the AP, it sends either the deauthentication or the disassociation frame to the AP, together x 1 to the AP. If f(x 1 ) = y 1 then the frame is authenticated and will be procceed accordingly. Otherwise, the frame is rejected. 4.Similarly, if the AP wants to disconnect from the STA, it sends the disassociation/deauthentication frame together x 2. The STA disconnects itself from the AP if f(x 2 )=y 2.

Dising attacks on networks: letter-envelop protocol STA AP Connection process STA AP Connection process STA AP Connection process Authentication Association Generate x 1 y 1 = f(x 1 ) y 1 y 2 y 2 =f(x 2 ) is already computed Ass. request Generate x 1 Compute y 1 =f(x 1 ) y 1 Data exchange Generate x i Compute y i =f(x i ) y 2 (a) Original Association (b) Modified Association (c) Modified Association (special case) Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran,Hai Vu, Neeraj Mittal, A lightweight solution for defending against de- authentication/disassociation attacks on networks, In IEEE 17th International Conference on Computer Communication and Networks (ICCCN), St. Thomas, US Virgin Islands, August 2008

Dising attacks on networks: implementation of letter-envelop protocol Thuc D. Nguyen, Duc H. M. Nguyen, Bao N. Tran,Hai Vu, Neeraj Mittal, A lightweight solution for defending against de-authentication/disassociation attacks on networks, In IEEE 17th International Conference on Computer Communication and Networks (ICCCN), St. Thomas, US Virgin Islands, August 2008

Dising attacks on networks: implementation of letter-envelop protocol The configuration of our system is as follows: One PC (CPU: Intel Celeron 3GHz, RAM: 1GB, HDD: 80GB) functioning as an AP. One PC (CPU: Intel Celeron 1.73GHz, RAM: 512MB, HDD: 80GB) functioning as a legitimate STA. this STA continuously sends ICMP ping packets to the AP to check the connection with the AP. One PC (CPU: Intel Core Duo 1.6GHz, RAM: 512MB, HDD: 80GB) running CommView for Wifi to launch the Farewell attack. We continuously send deauthentication and disassociation frames with spoof MAC address of the STA (to the AP) and of the AP (to the STA) at rate 10 frames/second. If AP can detect the frame to be a spoofed frame, they will ignore the frame and will not disconnect the STA. otherwise it will disconnect the STA and clear information related to that STA in the memory. The result of the experiments show that our solution is completely effective against the Farewell attack, none of the attacks is successful.

Availability 12 Defending against Dising attacks Determining hot-IPs

Computing heavy hittes Cormode and Muthukrishnan consider the following problem of determining hot items" or "heavy- hitters. in a given sequence of items from [n], an item is considered hot" if it occurs > m=(d + 1) times; where d is a given constant. Note that there can be at most d hot items. G. Cormode and S. Muthukrishnan. What's hot and what's not: tracking most frequent items dynamically. ACM Trans. Database Syst., 30(1):249{278, 2005.

Algorithm of Cormode-Muthukrishnan Cormode and Muthukrishnan proposed an algorithm based on Non-Adaptive Group Test (NAGT) that computes all the hot items as long as the input satises the following small tail property: all of the non-hot items occur at most m=(d + 1) times. Let M be a d- disjunct t n matrix. For each test i [t], maintain a counter c i. When an item j [n] arrives (leaves respectively), increment (decrement respectively) all the counters c i such that M ij = 1. The algorithm also maintains the total number of items m seen so far.

Disjunct-matrix A binary t N matrix is said to be d- disjunct if the union (or Boolean sum) of any d columns does not contain any other column.

Determining hot-IPs Let n be number of IP address and d be maximum number of IPs which can been attacked. Given a sequence of IPs, the problem is to find those IPs which occur most frequently. This is formalized as finding all IPs whose frequency exceeds a specified fraction of the total number of IPs. This problem can been solved by using group test method

Algorithm Let M be d-disjunct t n matrix C := (c 1,…,c t ) N t R:=(r 1,…,r t ) {-,+} t IP [n]*: sequence of IPs. For j=1 to t do c j =0 For each i IP, for j=1 to t do if m ij =1 then c j ++ For j=1 to t do If c j >d then r j =+ Else r j =-

Example

Determining hot-IPs Given R {-,+}t Find hot-IPs With each r i =- do for i=1 to n do if (m ij )=1 Then IP:=IP\{j} Return IP

Example