Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions

Slides:



Advertisements
Similar presentations
Nick Feamster CS 4251 Computer Networking II Spring 2008
Advertisements

© Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS591 – Wireless & Network Security.
Comp 361, Spring 20056:Basic Wireless 1 Chapter 6: Basic Wireless (last updated 02/05/05) r A quick intro to CDMA r Basic
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso, and Christos Verikoukis May 2010, Cape Town, South Africa, ICC 2010 Coexistence of a Novel MAC Protocol.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
John Bellardo Stefan Savage Presented by: Hal Lindsey
1 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3. PS in Ad.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards 1.
Security Awareness: Applying Practical Security in Your World
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
1 Introduction to Wireless Networks Michalis Faloutsos.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
802.11b Vulnerabilities, Ad-Hoc Mode, RF Jamming and Receiver Design Ritesh H Shukla Graduate Student ECE Dept Under the Guidance of Prof. William R Michalson.
Rensselaer Polytechnic Institute © Shivkumar Kalvanaraman & © Biplab Sikdar1 ECSE-4730: Computer Communication Networks (CCN) Chapter 5: The Data Link.
MAC Protocol By Ervin Kulenica & Chien Pham.
Semester EEE449 Computer Networks The Data Link Layer Part 2: Media Access Control En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex,
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
Chapter 5 outline 5.1 Introduction and services
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
CS640: Introduction to Computer Networks Aditya Akella Lecture 22 - Wireless Networking.
CWNA Guide to Wireless LANs, Second Edition Chapter Five IEEE Media Access Control and Network Layer Standards.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
IEEE Project started by IEEE for setting standard for LAN. This project started in (1980, February), Name given to project is year and month.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver Jungmin So and Nitin Vaidya University of Illinois.
CWNA Guide to Wireless LANs, Second Edition
An Energy-Efficient MAC Protocol for Wireless Sensor Networks (S-MAC) Wei Ye, John Heidemann, Deborah Estrin.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router Chapter 7.
K. Salah 1 Chapter 15 Wireless LANs. K. Salah 2 Figure 15.1 BSSs IEEE Specification for Wireless LAN: IEEE , which covers the physical and data.
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John BellardoStefan Savage Presented by: Hal Lindsey.
DoS Attacks On Wireless Voice Over IP Systems By Brendon Wesley Supervisor- Noria Foukia.
1 Chapter 8 Power Management in IEEE Yu-Chee 1. Possible Access Sequences for a STA in PS Mode 2. PS in Infrastructure Network 3.
Chapter 6 Multiple Radio Access
IEEE WLAN.
Chapter 6 Medium Access Control Protocols and Local Area Networks Wireless LAN.
Wireless. 2 A talks to B C senses the channel – C does not hear A’s transmission C talks to B Signals from A and B collide Carrier Sense will be ineffective.
Denial-of-Service Attacks: Real Vulnerabilities & Practical Solutions Luat Vu Alexander Alexandrov.
Universität Karlsruhe Institut für Telematik ECE 591
WLAN. Networks: Wireless LANs2 Distribute Coordination Function (DCF) Distributed access protocol Contention-Based Uses CSMA/ CA – Uses both physical.
Natalie Podrazik – CS 491V – “ Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Natalie Podrazik April.
A+MAC: A Streamlined Variable Duty-Cycle MAC Protocol for Wireless Sensor Networks 1 Sang Hoon Lee, 2 Byung Joon Park and 1 Lynn Choi 1 School of Electrical.
An Energy-Efficient MAC Protocol for Wireless Sensor Networks Speaker: hsiwei Wei Ye, John Heidemann and Deborah Estrin. IEEE INFOCOM 2002 Page
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Chapter 14 Wireless LANs.
MAC Sublayer MAC layer tasks: – Control medium access – Roaming, authentication, power conservation Traffic services – DCF (Distributed Coordination.
Medium Access Control in Wireless networks
Wireless Protocols. 2 Outline MACA 3 ISM: Industry, Science, Medicine unlicensed frequency spectrum: 900Mhz, 2.4Ghz, 5.1Ghz, 5.7Ghz.
1/23 Power Management in IEEE Yu-Chee Tseng.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
MAC Layer Protocols for Wireless Networks. What is MAC? MAC stands for Media Access Control. A MAC layer protocol is the protocol that controls access.
S-MAC Taekyoung Kwon. MAC in sensor network Energy-efficient Scalable –Size, density, topology change Fairness Latency Throughput/utilization.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Distributed-Queue Access for Wireless Ad Hoc Networks Authors: V. Baiamonte, C. Casetti, C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di.
DSSS PHY packet format Synchronization SFD (Start Frame Delimiter)
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
IEEE Wireless LAN. Wireless LANs: Characteristics Types –Infrastructure based –Ad-hoc Advantages –Flexible deployment –Minimal wiring difficulties.
EA C451 (Internetworking Technologies)
Computer Communication Networks
Network connectivity to the legacy wired LAN
Seminar class presentation Student: Chuming Chen & Xinliang Zheng
Protocol Details John Bellardo UCSD.
Performance Evaluation of an Integrated-service IEEE Network
Network connectivity to the legacy wired LAN
Presentation transcript:

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego Presented By Devon Callahan

Outline Introduction to 802.11and Motivation Related Work Vulnerabilities of 802.11 Practical Attacks and Defenses Experimental Results Conclusions Final Thoughts

Introduction 802.11 networks are everywhere Usually network clients are in a star topology with the Access point 802.11 b and g are most popular With such high dependency on 802.11 are there vulnerabilities...

Related Work Most of the work has focused on the confidentiality weakness in security of 802.11( WEP and WPA) What about availability? Lough identified vulnerabilities of MAC(disassociation, deauthentication, virtual carrier sensing) but did not validate

Related work (cont) Faria, and Cheriton identified problems posed by Authentication DoS attacks and purpose new authentication framework (not very light weight) AirJack, Omerta, void11, Radiate all wireless tools from early 2000's Some general 802.11 DoS attacks based on resource consumption(frame rate control)

Vulnerabilities of 802.11 Denial of Service the act of denying a computer user of a particular service Typically flood a client with more traffic than it can handle 802.11 more vulnerable than 802.3 because of the shared medium 2.4Ghz

Denial of Service on Wireless The attacker wants to disrupt and deny access to services by legitimate users Two main types of DoS in 802.11 RF Attacks or Jamming the wireless spectrum- disruption occurs when signal-to-noise ratio reaches certain level Protocol based attacking- the higher layers of communication which are easier $$ (Identity and Media-access control)

Identity Vulnerabilities A result of the trust placed in a speaker’s source address 802.11 nodes are identified at MAC layer by unique address as wired nodes are. Frames are not authenticated, meaning an attacker can change his MAC address and spoof other nodes (similar to what is done in ARP spoofing) Leads to 3 kinds of attacks: Disassociation attack Deauthentication attack Power saving mode attack

Disassociation A client can authenticate with multiple APs but associate with one in order to allow the correct AP to forward packets Association frames are unauthenticated 802.11 provides a disassociation message similar to the deauth message Vulnerability is spoofed message causing the AP to disassociate the client

Disassociation Attack AP Authentication Request Authentication Response Association Request Association Response Data Data Attacker Disassociation Disassociation

Deauthentication Attack Authentication Procedure After selecting an AP for communication, clients must authenticate themselves to the AP with their MAC address Part of Authentication framework is a message allowing clients to explicitly deauthenticate from the AP Vulnerability An attacker can spoof the deauthentication message causing the communication between AP and client to suspend, causing a DoS Result Client must re-authenticate to resume communication with AP

Deauthentication Attack AP Authentication Request Authentication Response Association Request Association Response Data Data Attacker Deauthentication Deauthentication

Deauthentication Attack (Cont.) By repeating attack, client can be kept from transmitting or receiving data indefinitely Attack can be executed on individual client or all clients Individual Clients Attacker spoofs clients address telling AP to deauthenticate them All Clients Attacker spoofs AP telling all clients to deauthenticate

Deauthentication or Disassociation? Deauthentication requires a RTT of 2 in order to resume communication Disassociation requires a RTT of 1 in order to resume communication Because it requires less work for the attacker Deauthentication is the more effective attack

Power Saving in 802.11 Nodes “sleep” to conserve energy AP will buffer clients packets until requested with a poll message TIM (traffic indication map) is a periodic packet sent by AP to notify client of buffered data Relies on sync of packets so client is awake when the TIM is sent

Attacks on Power Saving Attacker can spoof on behalf of AP the TIM message Client could think there is no data and go back to sleep Attacker forge management sync packets Cause client to fall out of sync with AP Attacker spoof on behalf of the client AP sends data while client is sleeping

Media Access Vulnerabilities Avoid collisions at all costs!!! Is the Attitude CSMA/CA stands for Carrier Sense Multiple Access with Collision Avoidance SIFS-time before preexisting frame exchange can occur(ACK)

Media Access Vulnerabilities(cont) DIFS-time used for nodes initiating new traffic Nodes will transmit randomly after the DIFS Attacker can send signal before every SIFS slot to clog the channel Requires 50,000 pps to shut down channel

More serious is RTS/CTS In order to avoid a “hidden terminal”

Virtual Carrier Sense Mechanism needed in preventing collision from two clients not hearing each other (hidden terminal problem) RTS/CTS A client wanting to transmit a packet first sends a RTS (Request to Send) RTS includes source, destination, and duration A client will respond with a CTS (Clear to Send) packet

NAV Vulnerability 2 2 6 6 6 6 6 0-2312 2 Frm Ctl Duration Addr1 Addr2 Addr3 Seq Ctl Addr4 Data FCS 802.11 General Frame Format Virtual carrier sense allows a node to reserve the radio channel Each frame contains a duration value Indicates # of microseconds channel is reserved Tracked per-node; Network Allocation Vector (NAV) Used by RTS/CTS Nodes only allowed to xmit if NAV reaches 0

Simple NAV Attack: Forge packets with large Duration Attacker Access Point and Node 2 can’t xmit (but Node 1 can) Duration=32000 Access Point Node 1 Node 2

Extending NAV Attack w/RTS AP and both nodes barred from transmitting Attacker Duration=32000 RTS Duration=31000 CTS Access Point Node 1 Node 2

Practical Attacks and Defenses Authors were able to implement these attacks with current software and hardware IPAQ running Linux with DLINK PCMCIA card Built app that monitors wireless channels for AP and clients Once identified by MAC a DNS resolver and dsnif are used to obtain better identifiers(userids)

How to Generate Arbitrary 802.11 Frames? Host Interface to NIC Key idea: AUX/Debug Port allows Raw access to NIC SRAM Download frame to NIC Find frame in SRAM Request transmission Wait until firmware modifies frame Rewrite frame via AUX port AUX Port Xmit Q SRAM BAP Xmit process Physical resources Virtualized firmware interface Radio Modem Interface

Simulating the NAV attack So how bad would the attack be? Simulated NAV attack using NS2 18 Users 1 Access Point 1 Attacker 30 attack frames per second 32.767 ms duration per attack frame

NAV Attack Simulation

Practical NAV Defense Legitimate duration values are relatively small Determine maximum reasonable NAV values for all frames Each node enforces this limit < .5 ms for all frames except ACK and CTS ~3 ms for ACK and CTS Reran the simulation after adding defense to the simulator

Simulated NAV Defense

Why the NAV attack doesn’t work Surprise: many vendors do not implement the 802.11 spec correctly Duration field not respected by other nodes Time (s) Source Destination Duration (ms) Type 1.294020 :e7:00:15:01 32.767 802.11 CTS 1.295192 :93:ea:e7:0f :93:ea:ab:df 0.258 TCP Data 1.296540 802.11 Ack 1.297869 1.2952 - 1.2940 = 1.2 ms Excerpt from a NAV Attack Trace

Deauth Attack Results

Practical Deauth Defense Based on the observed behavior that legitimate nodes do not deauthenticate themselves and then send data Delay honoring Deauthentication request Small interval (5-10 seconds) If no other frames received from source then honor request If source sends other frames then discard request Requires no protocol changes and is backwards compatible with existing hardware

Deauthentication Defense Results

More Robust Defense

Defense in Depth MAC 00-14-A4-2D-BE-1D Num 1 -35 dBm MAC AP Data Num 3 -35 dBm Num 4 -18 dBm Num 4 -34 dBm Num 1 RSS -35 dBm Num 2 RSS -36 dBm Num 3 RSS -35 dBm Attacker Deauthentication Num 4 RSS -18 dBm Data Num 4 RSS -34 dBm Num 5

Identity theft (MAC spoofing) occurs when a cracker is able to listen in on network traffic and identify the MAC address of a computer with network privileges Most wireless systems allow some kind of MAC filtering to only allow authorized computers with specific MAC IDs to gain access and utilize the network.

Man-in-the-middle attacks attacker entices computers to log into a computer which is set up as a soft AP hacker connects to a real access point through another wireless card The hacker can then sniff the traffic

Caffe Latte attack Way to defeat WEP By using a process that targets the Windows wireless stack, it is possible to obtain the WEP key from a remote client By sending a flood of encrypted ARP requests Attacker uses the ARP responses to obtain the WEP key in less than 6 minutes

Conclusion Deauthentication attack is most immediate concern Denial of Service Attacks in 802.11 are very plausible with existing equipment Although this research paper was published in 2003 the threat remains for 802.11 networks

THANK YOU! Questions?