Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.

Slides:



Advertisements
Similar presentations
Ethical Hacking Module XV Hacking Wireless Networks.
Advertisements

ITEC 6324 – Assignment Seven IEM Baseline Activity / Tool (Netstumbler, Kismet, Airopeek & AirSnort. Name: Victor Wong Instructor: Dr Crowley.
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Next Generation DECT R4 for Integral Enterprise Jörg Richter.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
Wireless LANs: Different, Slower, Kinda Cheaper Jim Gogan Director, ITS - Networking
Wireless Insecurity.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
CIST 1601 Information Security Fundamentals Chapter 12 Wireless Networking Security Collected and Compiled By JD Willard MCSE, MCSA, Network+, Microsoft.
Wireless LAN Technology
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
WIRELESS LAN SECURITY Using
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Chapter 7- Mobile and Wi-Fi Networks Taking signals on and off the air Connections to other networks Need to manage spectrum Managing and billing for services.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
PRESENTATION ON WI-FI TECHNOLOGY
Chapter 4 Application Level Security in Cellular Networks.
WEP Protocol Weaknesses and Vulnerabilities
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Wireless Intrusion Prevention System
Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
Lecture 24 Wireless Network Security
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Simon Prasad. Introduction  Smartphone and other mobile devices have made it so easy to stay connected.  But this easy availability may lead to personal.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
Securing a Wireless Home Network BY: ARGA PRIBADI.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Standard: Security Methods Jason Gibson TCM471 Professor Crum.
WIRELESS INTRUSION DETECTION SYTEMS
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Security Issues with Wireless Protocols
Introduction to Networking Security
Presentation transcript:

Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005

Overview Popularity of Wireless Networks Benefits of Wireless Networks Vulnerabilities in Wireless Networks Some solutions to enhance security in wireless networks

Popularity of Wireless Networks Executives of 180 firms using more than 500 personal computers, 40 percent have already implemented wireless networks, while another 31 percent plan on rolling out wireless support in the next 18 months. (Wireless Ethernet Compatibility Alliance) More than 1 million WLAN access points are in use by more than 700,000 U.S. enterprises. (Yankee Group in Boston)

Wireless Technologies Wireless technologies allow devices to communicate without physical connections All data transmission is traveling over the medium of radio frequency wireless technologies are currently from one main standard: The b standard is the first WLAN standard Other newer standards: a, g, n …etc

WLAN Standards TypeFrequencySpeedNotes b2.4GHz < 11Mbps a 5 GHz 54 Mbps g 2.4 GHz 54 Mbps Interoperable with b n Multiple frequencies 540 Mbps

Benefits of WLANs User Mobility: users now can be mobile yet retain high-speed, real-time access to the enterprise LAN Rapid Installation: time required for installation is reduced tremendously Flexibility: enterprises can now install and take down WLANs in their locations easily Scalability: WLAN network topologies can easily be configured to adapt specific business applications needs

Benefits of WLANs

Vulnerabilities in WLAN Easy Access Easy Access Rogue Access Points Rogue Access Points Unauthorized Use of Service Unauthorized Use of Service Service and Performance Constraints Service and Performance Constraints MAC Spoofing and Session Hijacking MAC Spoofing and Session Hijacking Traffic Analysis and Eavesdropping Traffic Analysis and Eavesdropping Higher Level Attacks Higher Level Attacks

Security Breaches Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Netstumbler to identify unsafe WLANs Netstumbler to identify unsafe WLANs

Netstumbler Application

Security Breaches: Methods Wardriving Wardriving Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered

How to Secure WLAN Enforce Strong Access Control Enforce Strong Access Control Regular Site Audits Regular Site Audits Design and Audit for Strong Authentication Design and Audit for Strong Authentication AuthenticityAuthenticity NonrepudiationNonrepudiation AccountabilityAccountability Adopt Strong Protocols Adopt Strong Protocols Perform Risk Analysis Perform Risk Analysis Protect the Core from the Wireless LAN Protect the Core from the Wireless LAN

Conclusion The only truly secure network is the one never built The only truly secure network is the one never built WLAN protocols are still evolving to meet the needs of businesses WLAN protocols are still evolving to meet the needs of businesses more vigilant due to new and open security holes when deploying wireless technologies more vigilant due to new and open security holes when deploying wireless technologies  Even though WLAN are becoming popular and a cost-effective alternative to traditional wired networks, reasonable precautions and vigilance must be taken in order to make wireless networks safe