Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.

Slides:



Advertisements
Similar presentations
Security in Wireless Networks Juan Camilo Quintero D
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Security+ Guide to Network Security Fundamentals, Third Edition
Gal Leibovich Liran Manor Supervisor: Hai Vortman.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Wired Equivalent Privacy (WEP)
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
WLAN What is WLAN? Physical vs. Wireless LAN
A Methodology for Evaluating Wireless Network Security Protocols David Rager Kandaraj Piamrat.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Networking Concepts By: Forrest Finkler Computer Science 484 Networking Concepts.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Solving the Security Risks of WLAN Tuukka Karvonen
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
 Houses  In businesses  Local institutions  WEP – Wired Equivalent Privacy -Use of Initialization Vectors (IVs) -RC4 Traffic Key (creates keystreams)
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Wireless Security Presented by Colby Carlisle. Wireless Networking Defined A type of local-area network that uses high-frequency radio waves rather than.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
IEEE Security Specifically WEP, WPA, and WPA2 Brett Boge, Presenter CS 450/650 University of Nevada, Reno.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Wireless Hacking Lesson 13. Reminder As a reminder, remember that the tools and techniques that you learn this semester are only to be used on systems.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Chapter-7 Basic Wireless Concepts and Configuration.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
We will talking about : What is WAP ? What is WAP2 ? Is there secure ?
WEP & WPA Mandy Kershishnik.
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman

Background  Network security is one of the most challenging aspects of the data communication area, especially in wireless networks  A rapid growth in the number of wireless networks in the last few years The importance of taking measurements in order to secure the wireless networks is very high  A need for a tool which reports:  Diagnosis of security properties of nearby wireless networks  Offers recommendations for security improvement  Offers general recommendations about the wireless infrastructure (Bonus)

Project Definitions & Goals  Getting familiar with protocol and its security mechanisms  Determine network properties and current security status  Recommend on security improvements  Gaining programming experience in.NET 3.5 environment (C#)  Object Oriented Design  Developing a GUI

Protocol  Wireless Modes: Infrastructure Peer to Peer (Ad-Hoc)  Three types of frames: 1. Data frames 2. Control frames: ○ Request To Send ○ Clear To Send ○ Acknowledgment ○ Etc… 3. Management frames: ○ Beacon ○ Probe Request ○ Probe Response ○ Association Request ○ Etc…

Security Authentication  Joining an infrastructure unsecured network  Old standard defines two authentication mechanisms: 1. Open System 2. Shared Key Authentication (WEP)  Open System is better than Shared Key Authentication if data encryption exists

Security – cont.  802.1X Authentication (EAP-TLS for mutual authentication)  Firewalls, VPNs, OTP systems – higher layer authentication techniques

Security Encryption  WEP – Wired Equivalent Privacy (40/ 104 bits key) Uses static keys – statistical attacks can reveal the key rapidly Doesn’t use cryptographic integrity protection  TKIP (WPA) Solves the problems of WEP: - Uses temporal keys - Implements message integrity check (MICHAEL) WPA is used in two authentication methods: - WPA Pre Shared Key (WPA Personal) X + WPA (WPA Enterprise)  CCMP (WPA2) Strongest security mechanism available today Based on Advanced Encryption Standard (AES) as its block cipher WPA2 is used in two authentication methods: - WPA2 Pre Shared Key (WPA2 Personal) X + WPA2 (WPA2 Enterprise)

Modes of NIC Operation  Local Mode: NIC receives only packets which are targeted to its address. This mode doesn’t require an association with an AP.  Promiscuous Mode: Allows the user to view all wireless packets on a network to which he has been associated.  Monitor Mode (RFMON): Allows to monitor all traffic in the air, transmitted in all wireless networks.

Local Mode  Local Mode: NIC receives only packets which are targeted to its address. This mode doesn’t require an association with an AP.  Restrictions: No MAC filtering discovery No “trigger-packets” for hidden networks  But…Using CommView drivers for future extensions for the project (When the drivers API will be exposed)

Wireless Security Analyzer (WSA)  Reflects our security study  Targeted at standard users, with basic computer skills but without previous knowledge in security  Can also be helpful for system administrators  Software engineering considerations were taken into account (GUI)

WSA Architecture  Based on Managed Wi-Fi library  A.NET class library allows you to control wireless network adapters installed on your Windows machine  The library wraps the “Native Wi-Fi API”, which: Contains functions, structures, and enumerations that support wireless network connectivity and wireless profile management Designed for C/C++ developers  Available since Windows Vista and Windows XP SP2 (only after applying a hotfix provided in KB article )KB article

WSA Architecture – Cont.  Four classes are used to implement WSA

DSSecurity Dataset  Two basic tables define the authentication and encryption algorithms  Only relevant combinations are held in two dedicated tables  Only one recommendation table will be used according to the user’s input – different recommendations for different user types  Easy updating

Future Development Assuming monitor mode is available in Windows: 1. MAC filtering detection 2. Discover hidden networks (by packet injection) 3. “Attack and Defense” – Disassociation/Deauthentication packets, nonstandard drivers 4. WEP/WPA-PSK cracking

Demo