This work is supported by the National Science Foundation under Grant Number DUE-0302909. Any opinions, findings and conclusions or recommendations expressed.

Slides:



Advertisements
Similar presentations
Network Attacks. Topics Objectives Rogue Devices Rogue Infrastructure Hardware Placement Data Theft & Malicious Insertion Security Feature Weaknesses.
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chapter 15 Radio Frequency Site Survey Fundamentals
Basic Network Security Perimeter devices – Firewall – Intrusion Detection/Prevention System – URL Filter/Web proxy – Spam filter If an attacker successfully.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Hotspot Express $ One of the Pioneers of complete WiFi solutions in India $ Hardware to create HOTSPOTs  Software to secure HOTSPOTs & Manage the users.
Presented by Serge Kpan LTEC Network Systems Administration 1.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wireless Security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
+ Architecture, Firewalls and Proxy Servers Networks.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
1 Part 4 Wireless Network Wireless Technologies Wireless Networks Wireless Computer Networks Personal Mobile Networks Industry Use Wireless Networks.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
Securing a Wireless Network
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
DUE Router and Switch Configuration Software Installation Module 2.
LTEC 4560 Summer 2012 Justin Kappel Networking Components.
Confidential and Proprietary Capturing Air: Tools and Methods to Make Wireless Assessments a Breeze Leo Walsh, GSNA Professional Jefferson Wells.
ECE 578: COMPUTER NETWORK AND SECURITY
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS LAN SECURITY Using
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Presented by: Dr. Munam Ali Shah
WEP Protocol Weaknesses and Vulnerabilities
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Challenges in (managing) Wireless Networks. Different types Licensed vs. unlicensed spectrum UWB GPRS Bluetooth Asymmetric networks (data on TV.
Communications & Networks National 4 & 5 Computing Science.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Securing A Wireless Home Network. Simple home wired LAN.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
CompTIA Security+ Study Guide (SY0-401)
Wireless Technologies
NETW 05A: APPLIED WIRELESS SECURITY Unauthorized Access
Security Issues.
Discussion and Conclusion
Computer Technology Notes #4
Wireless LAN Security 4.3 Wireless LAN Security.
Title of Poster Site Visit 2017 Introduction Results
Title of session For Event Plus Presenters 12/5/2018.
Denial-of-Service Jammer Detector Training Course Worldsensing
Comparison to existing state of security experimentation
Instructor: Mort Anvari
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Presentation transcript:

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. NETW 05A: APPLIED WIRELESS SECURITY Denial of Service By Mohammad Shanehsaz February 22, 2005

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. Objectives Explain how the following types of DoS RF jamming Data flooding Client hijacking

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. RF Jamming Use of high-power, narrowband RF transmitter and antenna will stop a wireless LAN High powered signal generation devices are inexpensive and simple to assemble and use Microwave ovens, 2.4GHz phones, Bluetooth devices, and Wi-Fi devices can cause unintentional RF jamming No defense other than physical security of the premises can prevent RF jamming attacks

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. Data Flooding Deny authorized users bandwidth on the wireless LAN by: - using traffic generation software one of which is Tamosoft’s Commview ( ) Inexpensive Easy to use - Downloading extremely large files from high bandwidth internet sites over the wireless LAN - Pull or push a file to or from an internal server on the LAN

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. Hijacking This is a situation in which an unauthorized user takes control of an authorized user’s wireless LAN connection. It is done at layer 2 for DOS and at layer 3 for attacking purposes. In order to hijack a wireless user, one must use an access point that replicates the functions being performed by an authorized access point. Using a jamming device will force users to roam. Next the layer 3 connection is established by running DHCP server.

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. Hijacking tools Forced roaming through RF jamming(layer2) - Bluetooth devices -Narrowband transmitters Access Point software ( layer2 ) -ZoomAir AP ( Windows ) -Cqure AP ( Linux ) Rogue DHCP Service ( layer3 ) -Kerio’s WinRoute ( )

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. tools YDI PSG Kit with antenna ZoomAir AP Cqure AP Tamosoft CommView

This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. Resources CWSP certified wireless security professional, from Mc Graw Hill