John Bellardo Stefan Savage Presented by: Hal Lindsey

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

Contents IEEE MAC layer operation Basic CSMA/CA operation
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Network Technology CSE Network Technology CSE3020 Week 9.
1 CSE401n:Computer Networks Lecture 16 Wireless Link & LANs WS: ch-14 KR: 5.7.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
Lecture #2 Chapter 14 Wireless LANs.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
MAC layer Taekyoung Kwon. Media access in wireless - start with IEEE In wired link, –Carrier Sense Multiple Access with Collision Detection –send.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Ethernet. Problem In an Ethernet, suppose there are three stations very close to each other, A, B and C. Suppose at time 0, all of them have a frame to.
Computer and Data Communications Semester Mohd Nazri Mahmud Session 4a-12 March 2012.
CWNA Guide to Wireless LANs, Second Edition
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John BellardoStefan Savage Presented by: Hal Lindsey.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions
Chapter 6 Multiple Radio Access
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Planning and Analyzing Wireless LAN
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
Wi-Fi. Basic structure: – Stations plus an access point – Stations talk to the access point, then to outside – Access point talks to stations – Stations.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Natalie Podrazik – CS 491V – “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Natalie Podrazik April.
SMAC: An Energy-efficient MAC Protocol for Wireless Networks
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
EA C451 (Internetworking Technologies)
Wireless LANs Wireless proliferating rapidly.
Computer Communication Networks
Lecture 27 WLAN Part II Dr. Ghalib A. Shah
Computer Communication & Networks
IEEE Wireless LAN wireless LANs: untethered (often mobile) networking
Seminar class presentation Student: Chuming Chen & Xinliang Zheng
Introduction to Wireless Networks
Wireless LAN Simulation IEEE MAC Protocol
ECSE-4730: Computer Communication Networks (CCN)
Chapter 6 Multiple Radio Access.
Presentation transcript:

John Bellardo Stefan Savage Presented by: Hal Lindsey 802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo Stefan Savage Presented by: Hal Lindsey

Outline What is 802.11? Types of Denial-of-Service (DoS) Attacks Vulnerabilities of 802.11 Practical Attacks and Defenses Experimental Results Conclusions Final Thoughts Demonstration

What is 802.11? 802.11 refers to a family of IEEE standards that define medium access and physical layer specs for wireless communication between clients and base stations. Generally consists of wireless clients communicating with an Access Point (AP) in a star network topology 802.11b and 802.11g most used versions Effective range ~100m

Popularity 802.11(mainly b & g) networks have flourished Universities, homes, business, government, etc. $3.6 Billion in revenue expected for 2008 Security is of obvious concern Threats to confidentiality well researched and being address (WPA, WPA2, etc.) Dos threats not as widely studied

Related Works Most work has focused on weakness in security of 802.11(mainly WEP) Lough, Faria, and Cheriton identified problems posed by Authentication DoS attacks and purpose new authentication framework. Black Hat community also aware of DoS attacks – Floeter (void11), Baird and Lynn (AirJack)

What is a DoS Attack? The act of denying a computer user of a particular service DoS attacks can happen on any level of the OSI model Most common type involves flooding a host until it cannot respond to legitimate traffic Wireless medium is even more susceptible to DoS attacks than wired

802.11 DoS Attacks In 802.11, the goal of DoS attack is to prevent legitimate users from accessing the wireless LAN 2 major types of Attacks RF attacks 802.11 Protocol attacks

RF Attacks on 802.11 Layer 1 attack (jamming) Involves attacker using some type of radio transmitter to generate noise in the 2.4 Ghz frequency Transmission disruption occurs when signal-to-noise ratio reaches certain level Attacks can be effective, but equipment is expensive Not a major attack focus

802.11 Protocol Attacks Level 2 attacks Based on vulnerabilities in 802.11 protocol Require only a laptop or PDA with wireless NIC Attacks based on Two kinds of vulnerabilities Identity vulnerabilities Media Access Control vulnerabilities

Identity Vulnerabilities

Identity Vulnerabilities Arise from implicit trust placed in a speaker’s source address 802.11 nodes are identified at MAC layer by unique address as wired nodes are. Frames are not authenticated, meaning an attack can change his MAC address and spoof other nodes (similar to what is done in ARP spoofing) Causes 3 kinds of attacks: Deauthentication attack (most effective) Disassociation attack Power saving mode attack

Deauthentication Attack Authentication Procedure After selecting an AP for communication, clients must authenticate themselves to the AP with their MAC address Part of Authentication framework is a message allowing clients to explicitly deauthenticate from the AP Vulnerability An attacker can spoof the deauthentication message causing the communication between AP and client to suspend, causing a DoS Result Client must re-authenticate to resume communication with AP

Deauthentication Attack (Cont.) Client authenticates then associates Attacker needs to only send 1 spoofed packet to AP Client forced to re-authenticate with AP

Deauthentication Attack (Cont.) By repeating attack, client can be kept from transmitting or receiving data indefinitely Attack can be executed on individual client or all clients Individual Clients Attacker spoofs clients address telling AP to deauthenticate them All Clients Attacker spoofs AP telling all clients to deauthenticate

Disassociation Attack Disassociation Procedure After Authentication, a client must associate with AP to allow the AP to forward packets on the clients behalf As with deauthentication, 802.11 provides a disassocation request to tell AP to stop handling the client’s traffic Vulnerability Attacker can spoof disassociation message causing the AP to disassociate the client, resulting in DoS Attack is nearly identical to deauthentication attack Result Client must re-associate with AP to resume communication

Which method is more effective? Both Deauthentication and Disassociaton provide similar DoS results but Deauthentication is more effective due extra work required to return to associated state Authentication happens before association, therefore a deauthentication attack will require a client to re-authenticate and re-associate Results in 2 RTT Disassocaton attack only requires a client to re-associate but not re-authenticate. Results in 1 RTT

Power Saving Mode Attack Power Saving Procedure To conserve power, clients are allowed to enter a sleep state in which clients tell the AP to buffer received packets while in sleep mode Client occasionally wakes and polls AP for buffered messages AP periodically sends Traffic information map (TIM) packets to alert client of buffered data Vulnerabilities Attacker can spoof polling or TIM messages Results in 3 types of attacks

Power Saving Mode Attack (Cont.) 3 Types of spoofing attacks Attacker can spoof polling message of client, causing AP to discard packets while client sleeps Attacker can spoof TIM message, convincing client there is no buffered data Attacker can forge key synchronization information, such as period of TIM causing client to fall out of sync with AP Comparison to other identity attacks More difficult to perform due to firmware restrictions Tends to be less effective then Deauthentication attack

Media Access Vulnerabilities

Media Access Control Layer 802.11 MAC layer controls how the medium is access by clients to allow for fast collision free transmision To prevent collisions, a combination of physical carrier-sense and virtual carrier- sense mechanisms is used Physical carrier-sense Uses CSMA/CA with Time windows Virtual carrier-sense Uses RTS/CTS with NAV

CSMA/CA CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance Works like wired Ethernet except uses Collision Avoidance instead of Collision Detection (due to lack of full duplex and a wire medium) In addition, Time windows are used to prioritize access to the medium Before sending, clients must observe a quiet medium for one of the time windows The two most import Time windows are: Short Interframe Space (SIFS) Distributed Coordination Function Interframe Space (DIFS)

Time Windows DIFS Defines the time the medium must be free before a client can transfer SIFS Defines the time to wait for transfer after a preexisting frame has been sent (after waited DIFS and sent) Shorter time than DIFS To avoid all nodes transmitting immediately after DIFS expires, time after DIFS subdivided into slots Each client randomly picks a slot to transmit in, if collision occurs then random backoff algorithm is used before resending

Attack on Time Windows Every transmitting client must wait at least an SIFS interval or longer An Attacker can completely monopolize the channel by sending a signal before the end of every SIFS interval Attack is limited Very resource intensive – SIFS is 28 µs (802.11b), the attacker will have to send 50,000 packets per sec to disable network

Virtual Carrier Sense Mechanism needed in preventing collision from two clients not hearing each other (hidden terminal problem) RTS/CTS A client wanting to transmit a packet first sends a RTS (Request to Send) RTS includes source, destination, and duration A client will respond with a CTS (Clear to Send) packet

Virtual Carrier Sense (Cont.) MAC data frame Duration field Indicates number of µs the channel is reserved Used in the exchange of RTS/CTS sequencing packets

Virtual Carrier Sense (Cont.) All clients receiving either RTS and/or CTS will set their Virtual Carrier Sense indicator called a Network Allocation Vector (NAV) Clients will use this information together with the Physical Carrier Sense when sensing the medium Only when a client’s NAV reaches 0 is it allowed to transmit over the medium

Virtual Carrier Sense (Cont.) Transaction between two stations and the NAV settings of the neighbors

Attack on NAV Arises from forging the duration field of a MAC packet Attacker can set Duration field to high values causing NAV values to be incremented and preventing channel access to others Maximum of 32767, equals to about 32 ms Attacker needs to transmit only 30 times per second Attack is improved if duration of RTS is forged, clients will propagate attack with CTS response

NAV Attack Example

NAV Attack Example with RTS/CTS

Practical Perspective Theoretically attacks work, but what about in actual practice on commodity hardware? Yes, after testing can be done with NIC tweaking Most NICs allow generation of management frames to exploit the identity attacks (deauthentication & disassociation) Most NICs do not, however, allow generation of control frames (required for NAV attack) due to firmware restrictions But, there is still away around this

Circumventing NIC Restrictions Firmware restrictions can be circumvented using AUX/Debug port (allows access to NIC SRAM) Steps Download frame to NIC Find frame in SRAM Request transmission Wait until firmware mods frame Rewrite frame via AUX port

Practical Attacks and Defenses

Deauthentication Attack Simulation Testing Hardware 1 attacker (iPAQ H3600 with Dlink DWL-650 card) 1 access point (built with Linux HostAP driver) 4 clients (winXp, Linux Thinkpad, Linux iPAQ, MacOS X) 1 monitoring station (record results of test) Scenario Each of the 4 legitimate clients attempt to transfer a large file via ftp Two Attacks Attack on individual client (MacOS X) at time 15 sec lasting 8 sec Attack on all clients at time 101 sec lasting 26 sec

Deauthentication Attack Results

Deauthentication Attack Defense Two Proposed Defenses Defense 1: Authenticate management frames Not feasible using software upgrade A standardized authentication framework is required, can take time Defense 2: Delay honoring deauthentication request Based on the observed behavior that legitimate clients do not deauthenticate then send data Small delay interval (5-10 seconds) If no other frames received from source then honor request Defense 2 more practical

Deauthentication Defense Results

Virtual Carrier Sense Attack (NAV attack) NAV attack simulation set up like Deauth Attack NAV simulation run several times with different hardware, resulted in failed attacks Conclusions: many vendors do not implement the 802.11 spec correctly NAV attack trace

NAV Attack Simulation Because of bug, NAV attack simulated using NS2 18 Clients 1 Access Point 1 Attacker Scenario Clients attempt to transfer large file via ftp Attack Simulated attacks with ACK frames and RTS/CTS sequence 30 attack frames per second 37.767 ms duration per attack frame

NAV Attack Results

NAV Attack Defense Defense based on fact that legitimate duration values are relatively small Put a cap on value of the max duration on received frames If station receives frame with duration more than cap value, truncate the duration of the cap value Strict adherence requires low and high cap Low cap has value equal to amount of time needed to send ACK plus media backoffs for frame High cap used when it is valid for data packet to follow observed frame

NAV Attack Defense (Cont.) Can further improve defense by considering the frame type of the duration Data and ACK frames These frames have high duration value if part of fragmented packet exchange. Can be ignored because fragmentation rarely used RTS frame A client that receives an RTS frame will also get the data frame. Duration value of RTS is respected till following data frame is received or not received CTS frame Two possibilities, Either CTS is unsolicited or observing client is a hidden terminal. Clients can choose to ignore lone CTS packets

Simulated NAV Defense Results

Conclusions 802.11 WLANs suffer from many DoS attacks not inherent in wired cousin. Should not depend on restricted firmware interfaces to prevent attacks Deauthentication attack is biggest concern Secure authentication mechanisms and MAC layer revisions needed

Final Thoughts 802.11 DoS attacks seem to stem from the IEEE’s goal to provide authentication, confidentiality, and integrity and not availability In the future, 802.11n and 802.16(WiMax) adoption will greatly extend the range of these networks. The impact of DoS attacks at the Data-Link level could be huge.

Demonstration

Deauthentication Demo Hardware Dell laptop with intel 3945 wireless NIC WUSB54G v.4 linksys wireless NIC adapter (ralink 2500 driver for packet injection support) Nokia 770 internet tablet Software Ubuntu 7.04 Aircrack-ng 0.6.2 (specially aireplay and airodump) Kismet Wireshark