Andrew Taylor. Electronic/Phy layer Overpowering, modulation techniques Management Frame DoS i.e. RTS/CTS Application Specific Application layer vulnerabilities.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Wi-Fi Technology.
Nick Feamster CS 4251 Computer Networking II Spring 2008
Doc.: IEEE /272a Submission June 2001 S. Choi, Philips Research Slide 1 Problems with IEEE (e) NAV Operation and ONAV Proposal Javier del.
Doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 1 Review of n A-MPDU DoS Issues – Progress and Status Authors:
Haiguang Wang, Jaya Shankar, Zhongding Lei
Doc.: IEEE /0410r2 Submission March 2011 Slide 1 Data Transmission Protection on the IEEE ac MU-MIMO Downlink Date: Authors:
Submission Page 1 August 2002 doc.: IEEE /503r0 Daryl Kaiser, Cisco Systems Radio Measurement: A Candidate Approach Daryl Kaiser (Cisco Systems)
Doc.: IEEE /0xxx0 Submission Summary of the CCC MMAC (M-22) Mathilde Benveniste, Avaya Labs Research Jeffrey Zhifeng Tao,
Wireless LAN Security Understanding and Preventing Network Attacks.
Mitigating Deafness in Multiple Beamforming Antennas
Vivek Jain, Anurag Gupta Dharma P. Agrawal
20-minute Intro to Hacking
Multi-rate Medium Access Control David Holmer
Dept. of computer Science and Information Management
6 October 2004 Joe Decuir, MCCISlide 1 doc.: IEEE a/0573r0 Submission Joe Decuir, MCCI Project: IEEE P Working Group for Wireless Personal.
Communication between Wireless Sensor Devices and GNU Radio
802.11g Wireless Outdoor CPE AP/Router
Click to continue Network Protocols. Click to continue Networking Protocols A protocol defines the rules of procedures, which computers must obey when.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 3 Networking Media.
Doc.: IEEE /0849r1 Submission July 2013 Brian Hart (Cisco Systems) Slide 1 New Technique: Enabling Real World Improvement By Exposing Internal.
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Submission doc.: IEEE /1409r0 November 2013 Adriana Flores, Rice UniversitySlide 1 Dual Wi-Fi: Dual Channel Wi-Fi for Congested WLANs with Asymmetric.
CH1 CWNA Certification Questions. Network Architecture Model What are the layers of the Network Architecture Model? – Core – Distribution – Access.
Operations Training for the VCS-150 Voice Conferencing Switch
1 Understanding and Mitigating the Impact of RF Interference on Networks Ramki Gummadi (MIT), David Wetherall (UW) Ben Greenstein (IRS), Srinivasan.
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Contents IEEE MAC layer operation Basic CSMA/CA operation
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
CS 350 Chapter-12 Wireless Technologies. Wireless Agencies & Standards AgencyPurposeWeb Site Institute of Electrical and Electronics Engineers (IEEE)
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Wireless Fundamentals Chapter 6 Introducing Wireless Regulation Bodies, Standards, and Certifications.
Module C- Part 1 WLAN Performance Aspects
Chapter 12-WLAN Troubleshooting
John Bellardo Stefan Savage Presented by: Hal Lindsey
Network Technology CSE Network Technology CSE3020 Week 9.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Wireless Networking So we talked about wired networks. What about wireless?
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering.
Napoli - 21 February 2004 – Simone Merlin SLIDE 1 Analysis of the hidden terminal effect in multi-rate IEEE b networks Simone Merlin Department of.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
802.11g Update Byron Early & Chad Burnham University Technology Services Westnet Meetings: July 8-10, 2003.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Jigsaw: Solving the Puzzle of Enterprise Analysis Yu-Chung Cheng John Bellardo, Peter Benko, Alex C. Snoeren, Geoff Voelker, Stefan Savage.
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Switched and Wireless LANs. 2 Shared media LANs u Limits to Shared Media LANs –FDDI, 100Base-X, 100VG-AnyLAN all shared media LANs v Only one station.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Sybex CCNA Chapter 12: Wireless Networks.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
CWNA Guide to Wireless LANs, Second Edition Chapter Four IEEE Physical Layer Standards.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John BellardoStefan Savage Presented by: Hal Lindsey.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Natalie Podrazik – CS 491V – “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Natalie Podrazik April.
Dependability in Wireless Networks By Mohammed Al-Ghamdi.
WLAN.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
© 2002, Cisco Systems, Inc. All rights reserved..
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Doc.: IEEE /034r0 Submission January 2002 Matthew B. Shoemake, TGg ChairpersonSlide 1 TGg Report to the IEEE Working Group Matthew B. Shoemake.
1 March 24, 2016 By Jay, Mihai, and Ryan Wi-Fi. 2 A GENDA ❖ Overview ➢ History ➢ The Big Picture ❖ IEEE Standard ➢ Headers ➢ Payload ❖ Properties.
Secure Software Confidentiality Integrity Data Security Authentication
Seminar class presentation Student: Chuming Chen & Xinliang Zheng
Axti.me – Basics by Isaac Acks v1.0 01/02/2018.
Presentation transcript:

Andrew Taylor

Electronic/Phy layer Overpowering, modulation techniques Management Frame DoS i.e. RTS/CTS Application Specific Application layer vulnerabilities

Quick interference recap: Any type of interference is bad with g/a due to QPSK Error correction/retransmission has a hard time keeping up under load.

Directional Antenna High power output FCC PtoP over 4 watts if directional antenna gain greater than 6dBi Legal attacks within FCC range Determined attackers wont care about FCC restrictions

RTS/CTS ACK (with large duration value) attack when AP using RTS/CTS, made by modifying the NAV to force a clear medium for an extended period of time.

Maximum NAV value is ~32 milliseconds. Attacker need only to transmit 30 times a second for full medium denial. RTS/CTS is not authenticated. Require correct firmware/hardware to disregard standards. (AUX port) Some clients disregard standards

New ones coming out all the time, vendor specific. Recent Cisco vulnerability allows a reload of the system when malformed POST is sent to the login page of the web administration. Patching systems and employing other means of security is the only way to be sure.

ARRL. (n.d.). Amature Radio Service. Retrieved March 2009, from ws/part97/ Cisco Systems. (2009, February 04). Cisco Security Center. Retrieved March 12, 2009, from x?alertId=16321 John Bellardo, S. S. (2002) Denial-of- Service Attacks. Retrieved March 2009, from cse.ucsd.edu/~savage/papers/UsenixSec03.pdf