Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Securing Wireless LANs A Windows Server 2003 Certificate Services Solution Ian Hellen – Principal Consultant Stirling Goetz – Principal Consultant.
Ethical Hacking Module XV Hacking Wireless Networks.
Security+ All-In-One Edition Chapter 10 – Wireless Security
Network Attacks. Topics Objectives Rogue Devices Rogue Infrastructure Hardware Placement Data Theft & Malicious Insertion Security Feature Weaknesses.
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Basic Computer Network. Connecting to the Internet Requirement  A computer or PDA or cell phone  An account with an ISP (Internet Service Provider)
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
Pengantar Teknologi Mobile 4 Antonius Rachmat C, S.Kom Wireless Fidelity.
1 Intercepting Mobile Communications: The Insecurity of …or “Why WEP Stinks” Dustin Christmann.
Security in Wireless Networks Juan Camilo Quintero D
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
15 November Wireless Security Issues Cheyenne Hollow Horn SFS Presentation 2004.
Wireless Insecurity.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
A History of WEP The Ups and Downs of Wireless Security.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless Network Hacking.  Authentication Techniques  1. Open System: no security techniques  2. Shared-Key: uses hashed string challenge with WEP.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
A Wireless LAN Security Protocol
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
إعداد : Alberto Escudero Pascual/ IT +46 النسخة العربية: أنس طويلة
IEEE i Dohwan Kim.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security Issues with Wireless Protocols
Presentation transcript:

Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang

Agenda What is wireless local area network? Wireless security Threats or attacks in wireless local area network Defense strategies References

Wireless Local Area Network

IEEE is a set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public spectrum bands.

Wireless Security In December 2004, a class of 100 undergraduates worked to map the city of Seattle, Washington over several weeks. They found 5,225 access points; 44% were secured with WEP encryption, 52% were open, and 3% were pay-for-access. [4]

Possible threats or attacks in wireless local area network Observations on Packets Captured Rogue Access Points Spoofing Denial of Service (DoS) Attacks Man-In-The-Middle Attacks Weakness of WEP

Wired Equivalent Privacy (WEP) WEP RC4 64 bit 128 bit more secure (bit slower speed) Pass phrase Wireless signals are easy to intercept and WEP security is fairly simple to crack given the right tools. AirSnort, WEPCrack, AirCrack.

Weakness of WEP

Man-In-The-Middle Attacks

Defense strategies Wi-Fi Protected Access (WPA and WPA2) Against Spoofing Against Flooding attack Against Eavesdropping Against DoS attack Virtual Private Networks (VPN)

WPA and WPA2 The recommended solution to WEP security problems is to switch to WPA2 or the less resource intensive WPA. One major improvement in the protocol over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger initialization vector, this provides greatly improved protection against the well-known key recovery attacks on WEP. RADIUS authentication

References 1) 2) Lawan A. Mohammed and Biju Issac, “DoS Attacks and Defense Mechanisms in Wireless Networks”, Mobile Technology, Applications and Systems, nd International Conference on Nov Page(s):8 pp. 3) Bradley Morgan, “Wireless Security Attacks and Defenses”, White paper, Available online: reless-Security-Attacks-Defenses.html reless-Security-Attacks-Defenses.html 4) Dan Schade, “Wireless Attacks and Defense”, Available online: df/Wireless_Attacks_DSchade.pdf df/Wireless_Attacks_DSchade.pdf