Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Security Awareness Chapter 5 Wireless Network Security.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
1 Wireless LAN Security Presented by Vikrant Karan.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Security and Wireless LANs Or Fun and Profit With Your Neighbor’s Bandwidth Chris Murphy MIT Information Systems.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Securing a Wireless Network
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Networking 102.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Northeastern Illinois University. Authors Salwa Abdelrahim Samia Nur Eldayim Supervisor Prof. Cafatori.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
WIRELESS LAN SECURITY Using
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Networks Tamus, Zoltán Ádám
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Presented by: Dr. Munam Ali Shah
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
PRESENTATION ON WI-FI TECHNOLOGY
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Wireless Networking & Security Greg Stabler Spencer Smith.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
Lecture 24 Wireless Network Security
Wireless Networks. Wireless Network A wireless network transports data from one device to another without cables or wires – RF signals – Microwaves –
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Securing a Wireless Home Network BY: ARGA PRIBADI.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Networks CSC September 23,
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Understand Wireless Security LESSON Security Fundamentals.
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Securing A Wireless Network
Wireless Fidelity 1 1.
Security of a Local Area Network
802.11b Wireless Network Security
Wi-Fi Technology.
Presentation transcript:

Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU

Wireless LANs Transmitter/receiver (transceiver), called an access point (AP), connects to a wired network End users access the wireless LAN through wireless-LAN adapters Single access point can support a group of users within a range of few hundred feet

Wireless LANs IEEE b standard by IEEE for wireless, Ethernet local area networks in 2.4 gigahertz bandwidth space IEEE b connects computers and other gadgets to each other, and to the Internet, at high speed, without cumbersome wiring, at low cost

Wireless LANs Laptops with PCMCIA card adapters Wireless LAN adapters Wired network

Wireless LANs Data rates ~ 1.6 Mbps range Throughput fine for , sharing printers, Internet access, multi-user databases Compatible with Ethernet or Token Ring Wireless LAN systems from different vendors might not be interoperable

Wireless LANs Applications Doctors and nurses in hospitals with PDA with wireless LAN access patient information instantly Warehouse workers can exchange information with central databases Senior executives in conference rooms make quicker decisions because they have real-time information at their fingertips

Neighborhood Area Network (NAN) People put up Access Points to cover a geographic neighborhood Coverage can be up to 1 kilometer in radius if the AP owner is using an omni-directional antenna Neighbors -in the NAN would use a directional antenna pointed back at the AP Thanks to NANs, anyone can walk around with a personal digital assistant (PDA) and be connected all around the neighborhood

Wireless LAN Popularity b Wireless access points ~$150 PC Card adapters ~ $70 Cheapness induces departments to set up on their own But there are inherent security problems Policy setting and technology deployment are equally important

Wireless LAN Security b Security features may not be turned on Wired Equivalent Privacy (WEP) and Media Access Control (MAC) address lists still leave WLANs vulnerable WEP encryption keys can be discovered by listening passively to sufficient traffic Positioning of APs is important to ensure traffic does not go out of corporate area

Wireless LAN Security Service Set Identifier (SSID) of each AP is needed by clients to access But SSIDs are broadcast by APs often Wireless Sniffer products can catch such points: AiroPeek NX, Sniffer Wireless 4.7, Observer 8.1, NetStumbler See

ReefEdge VPN WLAN Security Fix ReefEdge implements VPN firewall function to the wireless network Protects and secures wireless access to the enterprise network Authentication, encryption and fine-grained access controls Stops intruders from reading, modifying or injecting wireless traffic, or accessing protected resources

VPNs to the Rescue VPNs can encrypt wireless network traffic directly from the access point to the wireless client VPN-based systems have the benefit of being platform- and radio- technology-agnostic The WLAN can be situated behind a DMZ that's blocked off from the production network WLAN users may access the Internet through their wireless links — but will have to connect to the corporate network through an encrypted VPN link

Standard WLAN Deployment From Wireless Networks: The Definitive Guide by Matthew Gast

Matthew Gast Seven Security Problems of WLAN Easy Access - your network and its parameters are available for anybody with an card Rogue Access Points - Any user can run to a nearby computer store, purchase an access point, and connect it to the corporate network without authorization Unauthorized Use of Service – Anyone can access WLANs whose WEP feature is not turned on Service and Performance Constraints – 11 Mbps capacity of b is easily overwhelmed by sharing among multiple users; susceptible to DoS attacks by PING flood

Seven Security Problems of WLAN MAC Spoofing and Session Hijacking - your Attackers can observe the MAC addresses of stations on the network and use them for malicious transmissions (User Authentication and AP authentication needed) Traffic Analysis and Eavesdropping – Frame headers are always in the clear; WEP cracking is easy, though new products change the WEP key every 15 mins; for highly confidential data no substitute for strong encryption Higher Level Attacks – Once the WLAN is penetrated more dangerous attacks can be launched from within

Keeping your Wireless LAN Safe Enable WEP. Change the default SSID of your product. If your access point supports it, disable "broadcast SSID". Change the default password on your access point or wireless router. As a network administrator, you should periodically survey your site using a tool like NetStumbler to see if any "rogue" access points pop up.

Keeping your Wireless LAN Safe Many access points allow you to control access based on the MAC address of the NIC attempting to associate with it. Assign static IP addresses for your wireless NICs and turn off DHCP. It makes it tougher for the casual "drive by" to use your network. Buy access points or NICs that support 128-bit WEP. Only purchase access points that have flashable firmware. Check on additional proprietary security features beyond the b standard.

The most effective strategy: –Put your wireless access points into a DMZ, and –have the wireless users tunnel into your network using a VPN. Keeping your Wireless LAN Safe

Using a tool such as NetStumbler to detect –SSIDs –Manufacturer –Password –Encryption key Exercises

Reference Wireless Networks: The Definitive Guide by Matthew Gast, O’Reilly Press April , 464 pages, $44.95 US WLAN Deployment and Security Basics 00.asp 00.asp Keeping your Wireless Network Safe