Universiti Teknologi MARA MAC Layer Sniffer Using Spoof Detection Algorithm
|
|
|
- Dora Higgins
- 10 years ago
- Views:
Transcription
1 Universiti Teknologi MARA MAC Layer Sniffer Using Spoof Detection Algorithm Azwan Abdul Satar Thesis submitted in fulfillment of the requirements for Bachelor of Science (Hons) Information Technology Faculty of Information Technology And Quantitative Science MAY 2007
2 APPROVAL MAC LAYER SNIFFER USING SPOOF DETECTION ALGORITHM by AZWAN ABDUL SATAR This thesis project was prepared under the supervision of Final Year Project Coordinator, Puan Sofianita Mutalib and thesis supervisor, Puan Nik Mariza Nik Abdul Malik. It was submitted to the Faculty of Information Technology and Quantitative Science and was accepted in partial fulfillment of the requirements for the degree of Bachelor of Science. Approved by: NIK MARIZA NIK ABDUL MALIK Thesis Supervisor MAY 2007
3 DECLARATION I certify that this thesis and the research to which it refers are the product of my own work and that any ideas or quotation from the work of other people, published or otherwise arefiiuyacknowledged in accordance with the standard referring practices of the discipline MAY 15,2007 AZWAN ABDUL SATAR
4 ACKNOWLEDGEMENT First of all I thank almighty Allah whom through His grace and blessing has supported me during these times. I am greatly indebted to my supervisor, Puan Nik Mariza Nik Abdul Malik. This thesis would not have been completed without her attentive supports. I'm very thankful for her valuable guidance and comments. This research could not have been completed without the help and support of my housemate, Encik Aznor Zamhuri, Encik Faizul Nizam and Encik Rashidee Roslee in lending me their laptops for purpose of experimentation in this research. I am very grateful to all of them. I owe a lot to my parents, brothers and sisters for accepting my absence during my study. They have been a constant source of patience and encouragement. And finally I would like to express my gratitude to all lecturers of Faculty of Information Technology and Quantitative Science for who have inherit me their knowledge and to all my fellow fiiends who have been given me support directly or indirectly. Azwan Abdul Satar IV
5 TABLE OF CONTENTS CONTENT PAGE ACKNOWLEDGEMENT LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS ABSTRACT iv viii ix x xi CHAPTER ONE: INTRODUCTION 1.0 Introduction Problem Statement Objectives Scope Significance of the Research 4 CHAPTER TWO: LITERATURE REVIEW 2.0 Introduction IEEE802.il IEEE Link Layer Frame [a] Management Frames [b] Control Frames [c] Data Frames Prism Monitor Header Sniffing Sniffer MAC Address Spoofing MAC Address Spoofing Attack [a] Deauthentication/Disassociation [b] Power Saving DoS [c] Rouge Access Points 17
6 2.3.2 MAC Address Spoofing Detection [a] Sequence Number-Based MAC Address Spoof Detection 18 CHAPTER THREE: METHODOLOGY 3.0 Introduction Project Methodology and Approaches Proj ect Planning Analysis [a] Controlled Experimentation [b] Result of Analysis Development Evaluation & Testing [a] Alpha Evaluation & Testing Report Writing and Documentation 47 CHAPTER FOUR: FINDINGS AND DISCUSSION 4.0 Introduction Testing the Wireless Sniffer from Live Packet Capture Testing of Sniffer against Simulation of Wireless Traffic Test Result of Sniffer under Normal Traffic [a] Frames Coming From an AP [b] Frames Coming From a Station Test Result of Sniffer with Spoofing Activity Test Result of Sniffer with AP Misconfiguration Test Result of Sniffer under High Loss and Retransmit Frames 58 CHAPTER FIVE: CONCLUSION AND RECOMMENDATION 5.0 Introduction Advantages Limitation 61 VI
7 5.3 Recommendation and Future Work 63 REFERENCES 64 APPENDIX A: Source Code 66 vu
8 LIST OF TABLES TABLE PAGE 2.1 IEEE802.il Standard Frame Type, Subtype and Flag Control Table Result Table for Frames ComingfromAP under Normal Condition Result Table for Frames Coming from Station under Normal Condition Result Table for Frames with Spoofing Activity Result Table with AP Misconfiguration Result Table under High Loss and Retransmitted Frames 59 viu
9 LIST OF FIGURES FIGURE PAGE Frame Structure Frame Sequence Control SMAC Graphical User Interface Graphical Depiction of the Deauthentication Attack Flowchart ofthe Methodology Used Raw Iee Capture Data Prism Header Frame Type, Subtype and Flag Control Source Mac Address Source Mac Address of Data Frame Sequence Number Distribution of Sequence Number Gap for Frames Coming From AP Distribution of Sequence Number Gap for Frames Coming From Station Spoofing Simulation of Frames Sequence Number Gap Distribution of Sequence Number Gap for AP Misconfiguration Distribution of Sequence Number Gap for High Retransmit and High Loss Distribution of Sequence Number Gap for Frames Coming From an AP Distribution of Sequence Number Gap for Frames Coming from Station Spoofing Simulation of Frames Sequence Number Gap Distribution of Sequence Number Gap for AP Misconfiguration Distribution of Sequence Number Gap for High Retransmit and High Loss 58 IX
10 LIST OF ABBREVIATIONS ACK AP BSS CTS IBSS IEEE LAN MAC OSI OUI RF RTS RSSI SDLC SNR SSID SQ WEP WLAN WPA Acknowledgement Access Point Basic Service Set Clear to Send Independent Basic Service Set Institute of Electrical and Electronics Engineers Local Area Network Media Access Control Open System Interconnection Organizational Unique Identifier Radio Frequency Request to Send Received Signal Strength Indication System Development Life Cycle Signal Noise Ratio Service Set Identifier Signal Quality Wireless Equivalent Privacy Wireless Local Area Network Wireless Protected Access
11 ABSTRACT The explosive growth of networks has coincided with increased presence of security treat to these networks. A large portion of these treats are in the form of spoof attacks. Spoof attacks involve with impersonation of authorized network client to access network resource or to launch malicious code. If security measures in wireless network are not without doubts, it is worsen by its performance. Radio interference, attenuation, channel overlapping, sharing of bandwidth and overhead of the wireless protocol are known to degrade wireless network performance. This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. The testing of the wireless sniffer prototype was evaluated against four wireless traffic simulations under normal, spoofing, AP misconfiguration, high loss and retransmitted fi-ames conditions. The result of these tests showed that the wireless sniffer was able to identify all normal gap, spoofing, high gap between successive frames, out of order and retransmit frames. Furthermore, at the end of its execution, the sniffer provide simple network statistic allowing user to detect abnormal fraffic such as high gap between successive frames sequence number or high percentage of retransmitted frames send by a source. This indicates that the wireless network may have been misconfigured or some station may suffer from availability and connectivity issues. These characteristics of the wireless sniffer, provides a foundation for development of more advance monitoring tool that explicitly leveraging on the sequence number field in IEEE MAC header. XI
12 CHAPTER ONE INTRODUCTION 1.0 Introduction The development of wireless networks migrate connectivity into the era of mobile computing. Enterprises, small businesses, and even homes have been deploying wireless networking into their computing environment. Unfortunately, the migration to wireless networks suffers a downside as consumers overlooked the drawback of wireless networks with wired networks. Manufacturer advertised speed of wireless product and promise of mobility is not without a catch. Being a shared medium network, all traffic transmitted on the network passes through public airwaves. Because of this, the built-in security of wired networks, that is the inaccessibility of the transmission medium itself; the physical wires, is no more available in wireless networks. Furthermore in wireless networks, eavesdropping by unauthorized users is virtually impossible to be detected because Radio Frequency (RF) that emit beyond the physical boundary. If security measures in wireless network are not without doubts, it is worsen by its performance. Radio interference, attenuation, channel overlapping, sharing of bandwidth and overhead of the tireless protocol are known to degrade wireless network performance.
13 Growth in wireless network development has been directed toward better infrastructure with strong emphasis on security. However, deployment of wireless network put more burdens to administrator on the assessment on the security threats and reliability of their wireless network. This paper presented a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. The wireless sniffer implements sequence number-based spoofing detection algorithm in its processing. The information provided on both security and connectivity problem of wireless network can be generated by sniffing real-time frames capture using wireless adaptor or automation of log analysis on static pcap file. 1.1 Problem Statement The security threat of wireless network is overwhelming although vendors and standardised bodies are working rigorously to deploy more advanced security measures and newer wireless standard to bring sort of peace to the consumers. For network administrator, maintaining a wireless network would mean offering moreflexibilityto their network user in term of mobile freedom. However, the part where security is a crucial priority remains a cumbersome task. The fact is worsening by the complexity of deploying and maintaining wireless network to provide the freedom of mobility without compromising connectivity. It is without a doubt that network administrators are equipped with arsenal of monitoring software to measure both security and performance of their wireless network. Ranging from off the shelves utility, regardless whether it
14 is open source or proprietary products, it is up to the network administrator to develop the fundamental knowledge of how to treat the vast information from those software on their wireless network for better security and availability. The particular issues of security and connectivity of wireless network discussed in this research is MAC address spoofing and high loss and retransmitframes.mac address spoofing in wireless network that exploit the link layer vulnerability is common attack of impersonating authenticated station to gain access to the network. The implementation of sequence number-based spoofing detection algorithm in a wireless sniffer tries to accomplish the goal of an automated monitoring tool for network administrator to detect spoofing activity. In addition, the wireless sniffer can provide more reliable percentage of duplicate frames over total frames send per source station as part of it network statistic gathering. High percentage of retransmitted frames indicates that the station may suffer connectivity problem. The purpose of this paper is to enrich the repository of wireless tools available to network administrators using manipulation of data link layerframeswith combination of sequence number analysis technique. 1.2 Objectives The objectives of this research are: To conduct a study on underlying data link layer frames for frame sniffing analysis. To experiment on set of wireless frames traffic transactions that can be applied to MAC address sequence number spoofing analysis. To develop a tool that can identify spoofing and provide simple network statistic using sequence number analysis in wireless environment.
15 1.3 Scope The scope of this project is to conduct a study of how data link layer frames can be processed using sequence number analysis to identify spoofing and gather information about a wireless network. With the attained knowledge and understanding, a wireless sniffer tool is developed to automate spoofing detection and provide simple network analysis. 1.4 Significance of the Research The significance of the research is to provide understanding of how data link layer frames can be manipulated allowing spoofing detection mechanism and network information gathering using sequence number analysis. With this imderstanding, the tool developed is hope will be able to compliment the repository of network monitoring software and reduces dependencies on of-the-shelves software especially proprietary software that do not provide source code. As the tool was developed using Perl programming language, it will allow modification that can offer more flexibility in its processing.
16 CHAPTER TWO LITERATURE REVIEW 2.0 Introduction This chapter concern about the subject matter and issues concerning the research. This chapter will attempt to define and explain IEEE frames, network sniffing, MAC address spoofing and spoofing detection using sequence number algorithm. 2.1 IEEE is an industry standard developed by the Institute of Electrical and Electronics Engineers (IEEE) for Wireless Local Area Networks (WLANs). The original standard was defined in 1997, followed by a and b in 1999 and the latest Ig in These standards operate in the Industrial, Scientific, and Medical (ISM) frequency bands. Please refer Table 2.1. IEEE Standard a b Ig Data Rate (Speed) Radio Frequency Band 1-2 Mbps 2.4 GHz Up to 54 Mbps 5.8 GHz Mbps 2.4 GHz Up to 54 Mbps 2.4 GHz Table 2.1 : IEEE Standard
17 The IEEE standard allows for two different ways to configure a wireless network, that are ad hoc and infrastructure. In ad hoc mode, stations commimicate directly with each other on a peer-to-peer level, sharing a given cell coverage area. This type of network is often formed on a temporary basis, and is commonly referred to as an ad hoc network or Independent Basic Service Set (IBSS). In most deployment, the nodes are cormected to an access point (AP) or also known as infrastructure. These network access points are sometimes connected to landlines to widen the LAN's capability by bridging wireless nodes to other wired nodes. When an AP is present, stations do not communicate on a peer-to-peer basis. All communications between stations or between a station and a wired network client go through the AP. A BSS in this configuration is said to be operating in the infrastructure mode. IEEE applies at the lowest two layers of the Open System Interconnection (OSI) protocol stack, namely the physical layer and the data link layer. The physical layer standard specifies the signalling techniques used and the implementation of media specific fiinctions. The data link layer defines the frame transmission structure for control, data and management messages and the architecture for data transmission across a WLAN (IEEE, 1999).
18 2.1.1 IEEE Link Layer Frame The IEEE standard (IEEE, 1999) defines three frame types of both wireless adaptors and access points used for communications. The three frames types are: Management Frame Control Frame Data Frame Every frame regardless of its frame type has a control field that contains the protocol version, frame type and indicator of security features mechanism of WEP or WPA is enabled or not. In all frames contain MAC address of the source, destination station and the access point, frame sequence number, frame body and frame check sequence for error detection. The framestructure is illustrated in Figure 2.1. Octets; Frame Control Duration/ ID Address 1 Address 2 Address 3 Sequence Control Address 4 Frame Body FCS MAC Header Figure 2.1: Frame Structure Particular important part of the IEEE link layer with respect to this research is the frame sequence control. The 16 bit field is used for both defragmentation and discarding duplicate frames. It is composed of a 4 bit fragment number field and a 12 bit sequence number field. Fragment number is used for fragmented frames numbering starting from one with the next fragmented frame increments by one. Sequence number of frame is used to for reassembly of MAC layer frames. IEEE standard requires that the sequence number of each frame is assigned from a counter variable of modulo Successive frame is incremented by one while when a frame is retransmitted, the sequence number is not change. Please refer to Figure 2.2 for framesequence control structure.
19 2 bytes Frame Duraliun Control ID Address 1 (receiver) Address 2 (sender) Address 3 (filtering) Seqcil Address 4 (optional) Frame body FCS ^ ^""^ 12 bits ^ \ Fragmenl Number Sequence Number Figure 2.2 : Frame Sequence Control [a] Management Frames IEEE (1999) defined that management frames enable stations to establish and maintain communications. The following are common management frame subtypes: Authentication frame: authentication is a process whereby the access point either accepts or rejects the identity of a wireless adaptor. The wireless adaptor begins the process by sending an authentication frame containing its identity to the access point. With open system authentication, the wireless station sends only one authentication frame, and the access point responds with an authentication frame as a response indicating acceptance. With the optional shared key authentication, the radio wireless adaptor sends an initial authentication frame, and the access point responds with an authentication frame containing challenge text. The wireless station must send an encrypted version of the challenge text using its WEP key in an authentication frame back to the access point. The access point ensures that the wireless station has the correct WEP key by
20 seeing whether the challenge text recovered after decryption is the same with what was sent previously. Deauthentication frame: A station sends a deauthentication frame to another station if it wishes to terminate secure communications. Association requestframe: association enables the access point to allocate resources and synchronize with a wireless station. A wireless station begins the association process by sending an association request to an access point. This frame carries information about the wireless station, such as supported data rates and the SSID of the network it wishes to associate with. After receiving the association request, the wireless station is considered associating with access point. Association response frame: An access point sends an association response frame containing an acceptance or rejection notice to the wireless station requesting association. If the access point accepts the wireless station, the frame includes information regarding the association, such as association ID and supported data rates. If the association is accepted by the access point, the wireless station can utilize the access point to communicate with other wireless stations on the network and the resource of the network such as wired LAN or Internet access connected to the access point. Reassociation request frame: If a wireless station roams away from the currently associated access point and finds another access point having a stronger beacon signal, the wireless station sends a reassociation frame to the new access point. The new access point then coordinates the forwarding of dataframesthat may still be in the buffer of the previous access point waiting for transmission to the wireless station.
21 Reassociation response frame: An access point sends a reassociation response frame containing an acceptance or rejection notice to the wireless station requesting reassociation. Similar to the association process, the frame includes information regarding the association, such as association ID and supported data rates. Disassociation frame: A station sends a disassociation frame to another station if it wishes to terminate the association. For example, a wireless station that is shut down gracefully can send a disassociation frame to alert the access point that the station is powering off The access point can then renounce memory allocations and remove the wireless stationfromthe association table. Beacon frame: The access point periodically sends a beacon frame to annoimce its presence and relay information, such as timestamp, SSID, and other parameters regarding the access point to wireless stations that are within range. Wireless station continually scan all radio channels and listen to beacons as the basis for choosing which access point is best to associate with. Probe request frame: A station sends a probe request frame when it needs to obtain information from another station. For example, a wireless station would send a probe request to determine which access points are within range. Probe response frame: A station will respond with a probe response frame, containing capability information, supported data rates, after it receives a probe request frame. 10
22 2.2.1 [b] Control Frames IEEE (1999) defined that control frames assist in the delivery of data frames between stations. The following are common control frame subtypes: Request to Send (RTS) frame: The RTS/CTS function is optional and reduces frame collisions when hidden stations have associations with the same access point. A station sends a RTS frame to another station as the first phase of a two-way handshake necessary before sending a data frame. Clear to Send (CTS) frame: A station responds to a RTS with a CTS frame, providing clearance for the requesting station to send a data frame. The CTS includes a time value that causes all other stations to hold off transmission of frames for a time period necessary for the requesting station to send its frame. This minimizes collisions among hidden stations, which can result in higher throughput if properly implemented. Acknowledgement (ACK) frame: After receiving a data frame, the receiving station will utilize an error checking processes to detect the presence of errors. The receiving station will send an ACK frame to the sending station if no errors are found. If the sending station doesn't receive an ACK after a period of time, the sending station will retransmit the frame. 11
23 2.2.1 [c] Data Frames data frames carry protocols and data from higher layers within the frame body. A data frame, for example, could be carrying the HTML code from a Web page. Data frame carries packets from higher layers within the body of the frame Prism Monitor Header Prism monitor header is not a part of IEEE frame header, but is generated by the firmware of the receiving card. The header includes usefiil physical layer information, such as MAC Time, Received Signal Strength Indication (RSSI), Signal Quality (SQ), Signal sfrength. Noise, Signal Noise Ratio (SNR) and data rate. All signal and noise information are in manufacture-specific units. However, they can be used for relative comparison. (Jihwang et al., 2004) 12
24 2.3 Sniffing Sankar et al. (2005) refer sniffing as eavesdropping packets or irames on any medium, in related to this research, the air medium. Air medium provide the best environments for sniffing as it is imdetectable. Sniffing is done as the best way to figure out what is happening on the network. The result of sniffing would yield information about the network in the form of packet or fi"ame capture. However, the packets orfi-amesare required to be analyzed in order to better understand what information it carries Sniffer Howlett (2004) stated that sniffers are generally specific to the type of network they work on. This understanding establishes that type of sniffer is associated with the type of protocol it can analyze. Sniffer enables network traffic to be analysed for specific patterns, troubleshoot specific problems, spot suspicious behaviour and even being abused in reconnaissance of a network before launching attacks. Sniffers operate at the lower levels of the OSI model, the physical and data link layers. 13
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network
WLAN Security Why Your Firewall, VPN, and IEEE 802.11i Aren t Enough to Protect Your Network 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Executive Summary Wireless
WildPackets Guide to Wireless LAN Analysis
WildPackets Guide to Wireless LAN Analysis Executive Summary The market for wireless communications has grown rapidly since the introduction of 802.11 wireless local area networking (WLAN) standards. Business
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
NXC5500/2500. Application Note. 802.11w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note 802.11w Management Frame Protection Copyright 2015 ZyXEL Communications Corporation 802.11w Management Frame Protection Introduction IEEE 802.11w
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
IEEE 802 Protocol Layers. IEEE 802.11 Wireless LAN Standard. Protocol Architecture. Protocol Architecture. Separation of LLC and MAC.
IEEE 802.11 Wireless LAN Standard IEEE 802 Protocol Layers Chapter 14 Protocol Architecture Functions of physical layer: Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES. www.globalknowledge.com
Expert Reference Series of White Papers Wireless Bandwidth Not Necessarily as Advertised 1-800-COURSES www.globalknowledge.com Wireless Bandwidth Not Necessarily as Advertised Ted Rohling, Global Knowledge
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
How To Analyze The Security On An Ipa Wireless Sensor Network
Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation
Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs
Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
White Paper. Wireless Network Considerations for Mobile Collaboration
White Paper Wireless Network Considerations for Mobile Collaboration Table of Contents I. Introduction... 3 II. Wireless Considerations... 4 Channel Selection... 4 Interference... 4 Coverage... 5 Covering
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
RoamAbout 802.11 Wireless Networking Guide
RoamAbout 802.11 Wireless Networking Guide W i r e l e s s L A N s TM 9034042-02 Notice Notice Cabletron Systems reserves the right to make changes in specifications and other information contained in
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
AirWave Help Desk Guide. Help Desk Guide: Troubleshooting WLAN Issues with AirWave. 2006, AirWave Wireless, Inc. All rights reserved.
Help Desk Guide: Troubleshooting WLAN Issues with AirWave 2006, AirWave Wireless, Inc. All rights reserved. Page 1 of 8 Overview: Wireless LAN Troubleshooting for the Help Desk In a typical IT organization,
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
Getting Started with HP Wireless Networks. Version 10.41
Getting Started with HP Wireless Networks Version 10.41 Copyright 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ
Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Wireless Networking Basics. NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA
Wireless Networking Basics NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA n/a October 2005 2005 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and Auto Uplink are trademarks
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Virtual Access Points
Virtual Access Points Performance Impacts in an 802.11 environment and Alternative Solutions to overcome the problems By Thenu Kittappa Engineer Author: Thenu Kittappa Page 1 Virtual Access Points... 1
Troubleshooting WLAN Issues
Troubleshooting WLAN Issues AirWave Help Desk Guide Wireless LAN Troubleshooting for the Help Desk In a typical IT organization, it is the Help Desk s job to take incoming user support calls and determine
Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study
in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction
Chapter 2 Configuring Your Wireless Network and Security Settings
Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
WL-5450AP & WL-5460AP Wireless Access Point. User s Guide
WL-5450AP & WL-5460AP Wireless Access Point User s Guide 1 FCC Certifications This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
WI-FI TECHNOLOGY: SECURITY ISSUES
RIVIER ACADEMIC JOURNAL, VOLUME 2, NUMBER 2, FALL 2006 WI-FI TECHNOLOGY: SECURITY ISSUES Vandana Wekhande* Graduate student, M.S. in Computer Science Program, Rivier College Keywords: Wireless Internet,802.11b,
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Best Practices for Deploying Wireless LANs
Best Practices for Deploying Wireless LANs An overview of special considerations in WLAN implementations As wireless LANs (WLANs) continue to grow in popularity, particularly in enterprise networks, the
A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.
A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys
IEEE 802.11 Technical Tutorial. Introduction. IEEE 802.11 Architecture
IEEE 802.11 Technical Tutorial Introduction The purpose of this document is to give technical readers a basic overview of the new 802.11 Standard, enabling them to understand the basic concepts, principle
How To Manage An 802.11 Wireless Network At A University
WIRELESS POLICY 1 INTRODUCTION 1.1 Wireless networking is a fast emerging technology and is set to continue to grow for the foreseeable future. It is recognised that wireless networking could offer benefits
Chapter 2 Wireless Settings and Security
Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless
Air Marshal. White Paper
White Paper Air Marshal SEPTEMBER 2013 This document discusses potential security threats in a WiFi environment, and outlines how enterprises can use a best-in-class Wireless Intrusion Prevention System
LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
Analysis of Open Source Drivers for IEEE 802.11 WLANs
Preprint of an article that appeared in IEEE conference proceeding of ICWCSC 2010 Analysis of Open Source Drivers for IEEE 802.11 WLANs Vipin M AU-KBC Research Centre MIT campus of Anna University Chennai,
Help Desk Guide. Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite
Help Desk Guide Enterprise Troubleshooting WLAN Issues with AirWave Wireless Management Suite Overview In a typical IT organization, it is the Help Desk s job to take incoming user support calls and determine
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
WL-5460AP. User s Manual. 54Mbps Multi-Function Wireless AP. AirLive WL-5460AP v2 User Manual
WL-5460AP 54Mbps Multi-Function Wireless AP User s Manual 1 Copyright The contents of this publication may not be reproduced in any part or as a whole, stored, transcribed in an information retrieval system,
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
