Download presentation
Presentation is loading. Please wait.
2
Why Wireless? The answer is simple: Reach users who are often on the move!
3
Fastest Growing Wireless Technologies
4
Fastest Growing Wireless Customer
5
Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A user is using a wireless network service through Access Point, then Attacker will do DoS Attack on the wireless network. Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.
6
An architecture to detect 802.11 Attackers
7
Components to achieve protecting 802.11 DOS attacks Monitoring wireless networking Between attacker and defender Show what happen in the network graphically by using GUI Analyze vulnerabilities of 802.11 protocols Setup various attack daemons to exploit critical security holes of 802.11. Analyze log files from the observer Categorize attack patterns by using XML Detect attackers Report “under attack” Attacker(sonjong) Defender(eunyong) Observer(jaemoo)
8
Features Bare Essentials: DoS Attack program Decode captured frames Filter the captured frames Report statistical data Speed distributions Monitor real-time utilization Scan all the available channels Desired Features: Monitoring program properly works under all manufactured NIC. Bells and Whistles: Auto detect attacker and not accept any packet from attacker.
9
Similar program in the market place AiroPeek NX($3495.00), kismet($0.00) etc. Things they do well : SSID Tree Comprehensive Support for all 802.11 standards Security Audit Template Real-Time Expert Analysis Expert Mapping Expert ProblemFinder Analyze wireless network trends
10
Similar program in the market place Things they do poorly : Airopeek: Looks perfect! Kismet: Poor graphical user interface Does not have enough security things
11
Who needs? WLAN administrators. Security professionals. Home users who are interested in monitoring their WLAN traffic.Wi-Fi Programmers developing software for wireless networks.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.