Wireless Intrusion Detection System Proof of Concept Leon & Yunhai.

Slides:



Advertisements
Similar presentations
1 Fault Analysis for Large-scale Campus-wide Wireless Networks Jian Chen Department of CS, Tsinghua University, Beijing, China.
Advertisements

ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
Wireless LAN Security Understanding and Preventing Network Attacks.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
Visualization tool for network forensics analysis using an Intrusion Detection System ( Cyber ViZ )
Assignment 3 LTEC 4550 Cason Parker. Network Hub A Network Hub is a device that connects other devices together using Ethernet cables. Hubs are unintelligent.
Introduction to Site Surveys Matt Larsen, CEO Skybeam.
1 Packet Sniffers Prepared By: Amer Alhorini Supervised By: Dr. Lo'ai Tawalbeh NYIT New York Institute of Technology.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 CCNA 5.0 Planning Guide Chapter 8: Monitoring the Network.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Jigsaw: Solving the Puzzle of Enterprise Analysis Yu-Chung Cheng John Bellardo, Peter Benko, Alex C. Snoeren, Geoff Voelker, Stefan Savage.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Comparative Use of Unlicensed Spectrum Training materials for wireless trainers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
Submission doc.: IEEE 11-10/xxxxr0 doc.: IEEE 11-10/0864 Unified Metrics for Management of Smart Grid Home Area Networks Date: Slide 1Tim Godfrey,
COEN 252 Computer Forensics
WIRELESS COMMUNICATION NETWORKS Modeling and Simulation.
1 Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Benchmark H. Güneş Kayacık Nur Zincir-Heywood Malcolm I. Heywood.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
Monitoring for network security and management Cyber Solutions Inc.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Doc.: IEEE /273r0 Submission March 2003 Byoung-Jo “J” Kim, AT&T Labs-ResearchSlide 1 MIB Discussions for TGk Byoung-Jo “J” Kim
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Project Idea #1 Project: Simulation in NS Learn how to use NS-2 Examine 2-3 papers that do benchmark studies Implement a simulation of the Drexel TAARP.
POSTECH DP&NM Lab 1 Remote Network Monitoring (RMON)
Operational Security Capabilities for IP Network Infrastructure
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Standard: Comparison and Security Jason Gibson TCM471 Professor Crum.
Wireless Tools Training materials for wireless trainers.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
MOJO: A Distributed Physical Layer Anomaly Detection System for WLANs Richard D. Gopaul CSCI 388.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
PwC Making Wireless Networks Secure Computerworld 30 Nov 2004 Mark Vos.
How Bad Are The Rogues’ Impact on Enterprise Network Performance ? Kaixin Sui, Dan Pei, Youjian Zhao, Zimu Li Tsinghua University.
Challenges in (managing) Wireless Networks. Different types Licensed vs. unlicensed spectrum UWB GPRS Bluetooth Asymmetric networks (data on TV.
1 Intrusion Detection “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking resources.”
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim.
Troubleshooting a Network Understanding the Problem Troubleshooting Tools Where to Find Help 1.
Wireless Network Management SANDEEP. Network Management Network management is a service that employs a variety of tools, applications, and devices to.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
KFUPM Wireless LAN Sadiq M. Sait. Contents  Introduction  Technology - Brief overview  Project Plan RFP and Start dates Progress Curve  Coverage and.
IS3220 Information Technology Infrastructure Security
Personal Trip Assistance System. Intelligent Transport Systems Increase in traffic intensity  need for intelligent way for road usage.
Wireless Tools Joel Jaeggli For AIT Wireless Security Workshop.
WIRELESS NETWORK SECURITY Home vs Residential Wireless Gateways March 2016 (INTAN NORAZLINA HAIRUDDIN )
released for field test training
Wireless Network Monitoring
IDS Intrusion Detection Systems
Wi-Fi Business Networking
Working at a Small-to-Medium Business or ISP – Chapter 8
High Performance Computing Lab.
Wireless LAN Security 4.3 Wireless LAN Security.
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Chapter 8: Monitoring the Network
Radio Measurement Control Flow
CT 1306 Communication Networks Management Lab
Denial-of-Service Jammer Detector Training Course Worldsensing
TCP Protocol Analysis Access UMKC Home Page.
Unified Metrics for Management of Smart Grid Home Area Networks
By Markus Kriechhammer
Presentation transcript:

Wireless Intrusion Detection System Proof of Concept Leon & Yunhai

Agenda Project Review Info Measurements Data Analysis Sample Experiments Future Works

Project Review

Internet MIB IDS MIB

Attacker AiroPeek CS AP Project Review Internet IDS MIB, SysLog Client1 Attacker AP 2.4 GHz

Info Measurements Info Resources SNMP MIB A collection of objects that can be accessed via a network management protocol System Log Event/Trap Captures Wireless Capture

Info Measurements Info Collection Tools Hardware Cisco Access Point Cisco Wireless Card Software Visual Studio Net SNMP AiroPeek Netstumbler

MIB Collection & Storage

SysLog

Data Analysis Measurement Based Analysis Correlate Parameters w/ Events Contention Interference RF Interference Wireless Intrusion Wireless DoS Attack

Sample Experiments Contention Interference CS AP Client1 Test AP Client2 Chl 9 MIB

Contention Interference MIB dot11ACKFailureCount.1 dot11FailedCount.1 dot11FCSErrorCount.1 dot11FrameDuplicateCount.1 dot11MulticastTransmittedFrameCount.1 dot11MultipleRetryCount.1 dot11RTSFailureCount.1 dot11TransmittedFrameCount.1

Contention Interference

Sample Experiments Cordless Phone RF Interference AiroPeek Test AP Client1 Chl GHz

Cordless Phone RF Inter

Sample Experiments Intrusion Attack AirJack DoS Attack Void11

Future Works Real Time Automation Synchronize & Coordinate all info Extend to Simulations Measurements

Protocol Layering

MIB Structure