RF Monitor and its Uses



Similar documents
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

How To Analyze The Security On An Ipa Wireless Sensor Network

The Wireless Network Road Trip

Reducing MAC Layer Handoff Latency in IEEE Wireless LANs

FORTH-ICS / TR-375 March Experimental Evaluation of QoS Features in WiFi Multimedia (WMM)

A Transport Protocol for Multimedia Wireless Sensor Networks

Scanning Delays in Networks

Setting Up and Managing your Network

Hacking. Aims. Naming, Acronyms, etc. Sources

A Research Study on Packet Sniffing Tool TCPDUMP

Chapter 7 Low-Speed Wireless Local Area Networks

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

Multiple WiFi Clients on a Single Wireless Card

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

ROGUE ACCESS POINT DETECTION: AUTOMATICALLY DETECT AND MANAGE WIRELESS THREATS TO YOUR NETWORK

Multichannel Virtual Access Points for Seamless Handoffs in IEEE Wireless Networks

802.11: Use, Misuse and the Need for a Robust Security Toolkit

D1.2 Network Load Balancing

Encapsulating Voice in IP Packets

Analysis of Open Source Drivers for IEEE WLANs

ITRAINONLINE MMTK WIRELESS CLIENT INSTALLATION HANDOUT

Introduction to Passive Network Traffic Monitoring

ECE 4893: Internetwork Security Lab 10: Wireless Security

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Basic processes in IEEE networks

The Elements of GigE Vision

Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University

Advanced Technique for Monitoring and Shielding In Wi-Fi Technology

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

Tutorial on Network Management and Measurements. Tasos Alexandridis

Network Security: Workshop

Wireless LAN Pen-Testing. Part I

Performance Measurement of Wireless LAN Using Open Source

Design of an Application Programming Interface for IP Network Monitoring

EVALUATING THE NETWORKING PERFORMANCE OF LINUX-BASED HOME ROUTER PLATFORMS FOR MULTIMEDIA SERVICES. Ingo Kofler, Robert Kuschnig, Hermann Hellwagner

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

PeerBooster: Enhancing Throughput in Wi-Fi Networks Through Network Virtualization

Lab VI Capturing and monitoring the network traffic

Real-Time Communication in IEEE Wireless Mesh Networks: A Prospective Study

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

Network Forensics: Log Analysis

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Communication Systems Internetworking (Bridges & Co)

Wire-speed Packet Capture and Transmission

An Empirical Analysis of the IEEE MAC Layer Handoff Process

The next generation of knowledge and expertise Wireless Security Basics

Introduction VOIP in an Network VOIP 3

Investigating Wired and Wireless Networks Using a Java-based Programmable Sniffer

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE Wireless Local Area Networks (WLANs)

Network Traffic Analysis and Intrusion Detection using Packet Sniffer

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring Mike Freedman

Wave Relay System and General Project Details

RoamAbout Wireless Networking Guide

Network Security. Network Packet Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

VLAN for DekTec Network Adapters

Transport and Network Layer

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Qfiniti Enterprise and VoIP for Avaya. Qfiniti Enterprise and VoIP. An etalk Technical White Paper

An Accurate Technique for Measuring the Wireless Side of Wireless Networks

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

WANPIPE TM. Multi-protocol WANPIPE Driver CONFIGURATION M A N U A L. Author: Nenad Corbic/Alex Feldman

50. DFN Betriebstagung

Unit 23. RTP, VoIP. Shyam Parekh

Enhancing the Security of Corporate Wi-Fi Networks Using DAIR

Intrusion Detection, Packet Sniffing

Wireless security. Any station within range of the RF receives data Two security mechanism

Life of a Packet CS 640,

CREW - FP7 - GA No Cognitive Radio Experimentation World. Project Deliverable D7.5.4 Showcase of experiment ready (Demonstrator)

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Mobility Management Technique for Real Time Traffic in Networks

How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) (Ipam) (Networking) 2 (Ipom) 2(2

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

802.11b and associated network security risks for the home user

Wireless and Mobile Networks

Developing Wireless GPIB Test Systems Using the GPIB-ENET/100

WAP561 Wireless-N Selectable-Band Access Point with PoE

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

Gigabit Ethernet Packet Capture. User s Guide

CT LANforge WiFIRE Chromebook a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces

IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令

Computer Networks/DV2 Lab

Do You See What I See (DYSWIS)

Security in IEEE WLANs

Wireless Sniffing with Wireshark

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

point to point and point to multi point calls over IP

Wireless LAN Security: Securing Your Access Point

visual packet analysis

An Accurate Technique for Measuring the Wireless Side of Wireless Networks

Leased Line + Remote Dial-in connectivity

Network Discovery Protocol LLDP and LLDP- MED

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Collecting Packet Traces at High Speed

Transcription:

RF Monitor and its Uses Pradipta De prade@cs.sunysb.edu

Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on HW2

What is RF Monitoring? Wireless NICs ability to sniff the 2.4 GHz spectrum (or a portion of it). Similar to tcpdump for wired network. Purpose of Traffic Analyzers/Sniffers Snoop on clear-text traffic on network Observe network dynamics/traffic pattern Determine problems/bottlenecks Intrusion detection Find out more at: http://www.faqs.org/faqs/computer-security/sniffers/

RF Monitoring Requirements Access to the Shared Physical Media NICs that can go into promiscuous mode. All wireless NICs at encapsulated Ethernet level a select few at 802.11 frame level OS that can accept and transfer sniffed data to higher protocol layers. Tools that can interpret the sniffed data.

RF Monitoring Requirements Wireless Media is a shared media a node can hear all transmissions if within communication range. Wireless NIC support: 802.11b cards (Mostly Prism-2/2.5 chipset) Orinoco, D-Link DWL-650, SMC 2632W, Linksys WPC11(v2), Cisco Aironet 350 802.11 a/b/g combo cards (Almost all are Atheros / Broadcom chipset)

RF Monitoring Requirements (2) Linux (> 2.4.7) with NIC drivers: 802.11b (pcmcia-cs or pci drivers in kernel) 802.11a (madwifi driver for Atheros) http://sourceforge.net/projects/madwifi/ Prism cards have additional support for ARPHDR_IEEE80211_PRISM : More on this later

RF Monitoring Requirements (3) Several tools for interpreting sniffed data: Ethereal : offline analysis. Kismet : analysis of packets in realtime. Tcpdump, airsnort, etc. All of them use libpcap library (latest libpcap versions are patched for 802.11 specific changes.

Quick Installation Guide Setup the Linux kernel tree (2.4.19) turn wireless device support ON [enables wireless extensions support : standard API for configuring any wireless device on Linux] Get the correct driver for your card: Latest pcmcia-cs package for pcmcia based cards. Get driver patches for monitoring mode, (some drivers support monitor mode by default) http://airsnort.shmoo.com/orinocoinfo.html

Quick Installation Guide (2) Choose your traffic analyzer: Ethereal : http://www.ethereal.com Kismet : http://www.kismetwireless.net Compile, install and configure You are ready to snoop on others traffic

Using RF Monitoring wireless API to put card in monitor mode iwpriv <device> monitor [1/2] <channel> Use Ethereal to start packet capture for offline detailed analysis. Use Kismet, for real-time analysis, less detailed. Use Kismet-hopper, for scanning through all channels.

Packet Types in Ethereal Management Association, re-association, probe (requestresponse) Authentication, de-authentication & disassociation Beacon ATIM Control RTS, CTS, ACK, CF DATA

More Information: Prism Monitoring Header ARPHDR_IEEE80211_PRISM Prism cards/drivers add their own header in monitoring mode with extra information Host Time timestamp when the packet was retrieved from card buffer MAC Time timestamp when the packet was received by the card Rate Rate at which this packet was received Signal Quality, Noise, Channel Time etc.

Information: Analysis Everything is there in clear-text format Correlate the available information. Information: The encapsulated payload starts from the network protocol field. It is possible to read the MAC addresses also.

Analysis Limitations It is static and offline Still good if the time-stamp fields are what we interpret them as Real-time analysis will require faster CPU and accurate time-stamping.

Testbed Node: WRT54GS Wireless-G Broadband Router Uses MIPS processor. 1 Wireless interface, uses Broadcom chipset. Runs on Linux but wireless driver is not open source.

RF Monitoring on WRT54GS Utility called wl to configure wireless card parameters, eg. wl monitor 1 puts card in monitor mode. Use Kismet to sniff traffic. Run kismet_drone ( captures packets and sends it to a kismet server running on a different host through wired interface) Analyze the kismet dump file using Ethereal.

RF Monitoring on WRT54GS A B RF Monitor WRT54GS kismet_drone Desktop Kismet

Extending RF Monitoring Standard RF monitoring only captures/shows good packets. How to capture corrupted packets? Corrupted packets are discarded when frame checksumming fails. A field is set denoting FCS failure driver checks it to update Rx error stats before discarding pkt. Modify the driver to accept packets with FCS error.

Are corrupted packets useful? Usual Typically networks do not support error resilient codecs packets with any level of corruption is discarded. Desirable Error resilient protocols can withstand partial corruption of packets accept packets with a threshold on corruption level. Use in Realtime streaming applications over noisy channels change link/transport layer to bypass checksumming.

UDP Lite Protocol (Larzon, Degemark and Pink) Flexible checksumming scheme allows corrupted data to be transmitted to the application length field in UDP header replaced by coverage field specifies how many bytes of payload to checksum 0 7 8 15 Source port # Length/Coverage Dest port # checksum

UDP Lite on GSM Network (Konrad, Singh, Joseph) GSM Network PSTN Mobile Host Unix BSDi 3.0 GSM Base Station Fixed Host Unix BSDi 3.0 3% Mean & Std Dev Packet Loss (%) 2% 1% 2.09% 1.05% 0% 0.00% UDP, non-transparent UDP, transparent UDP Lite, transparent

UDP Lite on GSM Network Video Screenshot from experiemnt UDP UDP Lite

UDP Lite on multihop 802.11b network Different error characteristics on 802.11b networks. Over multihop errors tend to accumulate. Useful scenario for UDP Lite.

RF Monitor for UDP Lite Implementation Link layer checksumming is bypassed by modifying driver to allow packets with FCS error. UDP protocol fields are checked for correctness using BPF use raw socket to give the packet to application. Our coverage length is only the UDP header.

UDP Lite Performance

Comments on HW2 Broadcom wireless card driver in WRT54GS is NOT open source cannot capture corrupted packets in RF monitor mode.

Modified Problem 2 RF Monitor Chan 1 A Chan 1 Reliable UDP B Set retx count = 0 wl srl 1 C Chan 4 D i. ii. time Change transmit power from 1mW to 30mW wl txpwr 1