A Passive Approach to Rogue Access Point Detection IEEE GLOBECOM 2007 Lanier Watkins Raheem Beyah Cherita Corbett 20083150 김진석.

Slides:



Advertisements
Similar presentations
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Advertisements

LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Networks: Sample Performance Problems 1 Sample Network Performance Problems.
Networks and Distributed Systems: Project Ideas
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
Analysis of Privacy Jim McCann & Daniel Kuo EECS 598.
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
MAC Protocol By Ervin Kulenica & Chien Pham.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
Advanced Computer Networks 1 Sample Network Performance Problems.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Basic Networking Components
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
ECE 4450:427/527 - Computer Networks Spring 2015
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Doc.: IEEE /388r0 Submission March 2004 Michael Paljug, ConexantSlide 1 Introduction and Call for Interest in Standardizing Wake On Wireless LAN.
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
TCP Enhancement for Random Loss Jiang Wu Computer Science Lakehead University.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Company LOGO Networking Components Hysen Tmava LTEC 4550.
Wireless Encryption: WEP and cracking it. Eric Shea.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
Doc.: IEEE /2778r1 Submission November 2007 Sandra Qin et al., SamsungSlide 1 Content Protection Support in Date: Authors:
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
TCP with Variance Control for Multihop IEEE Wireless Networks Jiwei Chen, Mario Gerla, Yeng-zhong Lee.
USING CROSS-LAYER ENGINEERING TO AD-HOC NETWORK ROUTING SUPPORT MILITARY UNIVERSITY OF TECHNOLOGY FACULTY OF ELECTRONICS TELECOMMUNICATION INSTITUTE WARSAW,
IEEE j Relay-Based Wireless Access Networks VASKEN GENC, SEAN MURPHY, YANG YU, AND JOHN MURPHY, UNIVERSITY COLLEGE DUBLIN SCHOOL OF COMPUTER SCIENCE.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
A Multi-Channel CSMA MAC Protocol with Receiver Based Channel Selection for Multihop Wireless Networks Nitin Jain, Samir R. Das Department of Electrical.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Multi-Channel MAC Protocol for Multi-Hop Wireless Networks: Handling Multi-Channel Hidden Node Problem Using Snooping Myunghwan Seo, Yonggyu Kim, and Joongsoo.
Wireless Mesh Networks Myungchul Kim
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
A Load-Balanced Guiding Navigation Protocol in Wireless Sensor Networks Wen-Tsuen Chen Department of Computer Science National Tsing Hua University Po-Yu.
Data Communications is the Real World OSI Layers 1 & 2 a.k.a TCP/IP Network Interface Layer.
1 Chapter 4 MAC Layer – Wireless LAN Jonathan C.L. Liu, Ph.D. Department of Computer, Information Science and Engineering (CISE), University of Florida.
Doc.: IEEE /0598r0 Submission May 2004 Tyan-Shu Jou, et al., Janusys NetworksSlide 1 Is Spanning Tree Protocol Right for ESS Mesh? Tyan-Shu Jou,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Energy-Aware Target Localization in Wireless Sensor Networks Yi Zou and Krishnendu Chakrabarty IEEE (PerCom’03) Speaker: Hsu-Jui Chang.
PAC: Perceptive Admission Control for Mobile Wireless Networks Ian D. Chakeres Elizabeth M. Belding-Royer.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
CS440 Computer Networks 1 Wireless LAN (IEEE ) Neil Tang 10/01/2008.
ICUPC’98 Jing Deng and Zygmunt J. Hass
Outline What is Wireless LAN Wireless Transmission Types
Wireless Local Area Network (WLAN)
CS 457 – Lecture 7 Wireless Networks
CompTIA Security+ Study Guide (SY0-501)
802.11b Wireless Network Security
Authors: Ing-Ray Chen; Yating Wang Present by: Kaiqun Fu
Self Organized Networks
Detect and Prevent Rogue Traffic in Mobile Ad Hoc Networks
An Overview of Security Issues in Sensor Network
Presentation transcript:

A Passive Approach to Rogue Access Point Detection IEEE GLOBECOM 2007 Lanier Watkins Raheem Beyah Cherita Corbett 김진석

Contents Introduction Related Works Main Idea Experiment and Result Conclusion Discussion

Instruction Rogue AP? ◦Unauthorized AP ◦Produces Security Vulnerabilities ◦Unmonitored Point of Entry (to Private Network) Detection ◦Difficult to Detect ◦Hidden AP (Location and No Broadcasting) ◦No Information from Rogue AP and Offender

Instruction RTT? ◦Round Trip Time ◦Time Between Sending Packet and Receiving Response ◦Related Works  Optimization of Protocol for Link Characteristic  RTT in QoS Issue

Related Works Wireless vs. Wired Active vs. Passive Wired and Passive Approach!

Related Works Wireless vs. Wired ◦Wireless : Using APs, Sensors, Walking the Halls..  Time/Cost Consuming  Detection Time is Limited  Frequency Problem  Sensing Range  Disable the SSID Broadcasting  Low Signal Strength / Directional Antenna

Related Works Active vs. Passive ◦Active : Using Queries, New Packets  Network Load Increased  Rogue APs can Ignore Queries ◦Passive : MAC Address, Using Ack-pairs..  MAC Address can be spoofed/cloned  Converging time -> In In-line Deployment?

Main Idea Total delay = d prop + d trans + d proc + d queue Total delay = d trans = packetsize / capacity Same Higher-layer Protocol (TCP/IP) d trans -> Characteristic of Physical-Layer

Main Idea

Experiment Very Simple Testbed No Other Traffic Using Same Laptops for Node

Result

Result

Result

Result

Conclusion Wireless nodes have greater RTT RTT and Authorized AP Information (Capacity)Wired >> Wireless Result of DCF, Using Variation Wired/Passive!

Discussion Limited to TCP/IP (Other Protocols?) Simple Test Bed -> Complex Network Computational Capacity of Nodes Assumption : Wired >> Wireless = True?