Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

Security in Wireless Networks Juan Camilo Quintero D
Hands-On Ethical Hacking and Network Defense Lecture 15 Man in the Middle Attack to get Passwords from HTTPS Sessions.
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
CAN A DATABASE REALLY BE SECURE? PRESENTED BY AUDREY WILLIAMS.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security Awareness: Applying Practical Security in Your World
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Web server security Dr Jim Briggs WEBP security1.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Chapter Overview Network Communications.
Web Server Administration Chapter 10 Securing the Web Environment.
Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Software Security Testing Vinay Srinivasan cell:
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Project Idea #1 Project: Simulation in NS Learn how to use NS-2 Examine 2-3 papers that do benchmark studies Implement a simulation of the Drexel TAARP.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
18-jan-962. ETH-W4 (ra)1 security on the Web l security l authentication l privacy.
Directory and File transfer Services By Jothi. Two key resources Lightweight Directory Access Protocol (LDAP) File Transfer protocol Secure file transfer.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Wireless Networking & Security Greg Stabler Spencer Smith.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
Module 11: Designing Security for Network Perimeters.
Wireless Security on the Philippine Setting. Introduction: WHOAMI What’s this all about?
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Ingredients of Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Understand Internet Security LESSON Security Fundamentals.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Security Benefits of Firewall Protection
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Understand User Authentication LESSON 2.1A Security Fundamentals.
Virtual Private Networks
Secure HTTP (HTTPS) Pat Morin COMP 2405.
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
CAN A DATABASE REALLY BE SECURE?
Wireless Modes.
FTP - File Transfer Protocol
Welcome To : Group 1 VC Presentation
CLIENT/SERVER COMPUTING ENVIRONMENT
Cloud Security AWS as an example.
Cloud Security AWS as an example.
Introduction to Networking Security
Presentation transcript:

Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk

Overview Infrastructure Networks vs. Ad Hoc Networks Access Points (AP) Secure vs. Non-secure Data Encryption Public vs. Private Available to everyone

Types of Wireless Security Wireless Portals – Computers running server software that manages the every connection on a given access point. (ex. Monowall, noCatAuth, & WiFiDog) Security Protocols – Standardized software that is installed both an access point and client computer which dictate how the computer and access point should communicate. (ex. Web Encryption Protocol(EAP), Password Authentication Protocol (PAP))

What is the big deal about wireless security? -“The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards - and even then I have my doubts. ” Eugene H. Spafford, director of the Purdue Center for Education and Research in Information Assurance and Security. -Sensitive Data (Passwords, Social Security Numbers, Credit Card Information, Personal Content) -Data is only as secure as the computer that it is transmitted to/from.

Wireless Vulnerabilities -Wireless / Network Sniffing -Wireless Probing -MAC Address Spoofing / IP Spoofing -Man in the middle attack -Address Resolution Protocol (ARP) Poisoning -Denial of Service

Wireless Vulnerabilities -We have a problem. -How can something possibly be public and secure? -A new protocol -Wireless Portal

CHOICE Network -Protocol For Authorization of Negotiation of Services (PANS). -Lightweight mechanism -That provides authorization, access control, privacy, security, local mobility, and last-hop Quality of Service (QoS) -Personalized key. Uses a key and a token to encrypt data. -Implementation of a protocol that could possibly be used for a Public and Secure Wireless Network

Illustration of CHOICE Secure Wireless Internet Access in Public Places, Paramvir Bahl, Srinivasan Venkatachary

CHOICE Network Downfalls -Proprietary -Uses a new protocol -Can probably still be cracked.

Linux Wireless Portal -Machine connected directly to the AP -Running a Linux based Wireless Portal -Portal manages all connections between clients and internet.

Linux Wireless Portal Downfalls -Very vulnerable to sniffing, since packets over the air are not encrypted. -Uses MAC address as reference to client

What Next? -Wireless Portal -Users should be given less freedom on the network. (i.e. no access to local subnet) -Encryption of data is possible with application on client side. (from web browser or download). -Doesn’t require a new protocol.

Questions? ?