Why Wireless? The answer is simple: Reach users who are often on the move!

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Wireless LAN Security Understanding and Preventing Network Attacks.
REFLEX INTRUSION PREVENTION SYSTEM.. OVERVIEW The Reflex Interceptor appliance is an enterprise- level Network Intrusion Prevention System. It is designed.
Introducing FailSafeSolutions Online Backup Software.
Network Instruments Troubleshooting Techniques. What to look for in network monitoring solutions… Key Elements Real Time Statistics Visual Network Traffic.
Introduction to Network Analysis and Sniffer Pro
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
Lecture 11 Intrusion Detection (cont)
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
Department Of Computer Engineering
Intrusion Detection System Marmagna Desai [ 520 Presentation]
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Operating System.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Penetration Testing Security Analysis and Advanced Tools: Snort.
Hosted by IDS for WLANs The Mansfield Group, LLC Security for Enterprise Networks Wireless LAN Security Workshop Wash DC Honolulu.
VoIP Packets In the Air and Over the Wire J. Scott Haugdahl CTO
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Honeypot and Intrusion Detection System
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Wireless Tools Training materials for wireless trainers.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Fluke Networks N E T W O R KS U P E RV I S I O N.
Linux Networking and Security
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Basic component of Network Management Woraphon Lilakiatsakun.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
TeleCont A short description of the application. Presentation topics TeleCont features Users and permission levels Sending commands to field devices Receiving.
Packet Capture and Analysis: An Introduction to Wireshark 1.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
Introduction to Computer Networks Introduction to Computer Networks.
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Vehicle Traffic Simulator and Intersection Collision Warning System Wireless repeater Rebroadcast received packets (once) Packet transmission behavior.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Some Great Open Source Intrusion Detection Systems (IDSs)
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Packet Sniffing Hans Kokx
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
[blank page for bug work-around]
By Sachin Kumar Korenga & Rochita Thakkallapally
Top 5 Open Source Firewall Software for Linux User
Advanced Troubleshooting with Cisco Prime NAM-3: Use Case
CWAP-402 Dumps PDF Certified Wireless Analysis Professional CWAP-402 Dumps CWNP.
Configure a Wireless Router
6. Application Software Security
Intrusion Detection Systems
LM 5. Wireless Network Security
Presentation transcript:

Why Wireless? The answer is simple: Reach users who are often on the move!

Fastest Growing Wireless Technologies

Fastest Growing Wireless Customer

Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A user is using a wireless network service through Access Point, then Attacker will do DoS Attack on the wireless network. Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.

An architecture to detect Attackers

Components to achieve protecting DOS attacks Monitoring wireless networking Between attacker and defender Show what happen in the network graphically by using GUI Analyze vulnerabilities of protocols Setup various attack daemons to exploit critical security holes of Analyze log files from the observer Categorize attack patterns by using XML Detect attackers Report “under attack” Attacker(sonjong) Defender(eunyong) Observer(jaemoo)

Features Bare Essentials: DoS Attack program Decode captured frames Filter the captured frames Report statistical data Speed distributions Monitor real-time utilization Scan all the available channels Desired Features: Monitoring program properly works under all manufactured NIC. Bells and Whistles: Auto detect attacker and not accept any packet from attacker.

Similar program in the market place AiroPeek NX($ ), kismet($0.00) etc. Things they do well : SSID Tree Comprehensive Support for all standards Security Audit Template Real-Time Expert Analysis Expert Mapping Expert ProblemFinder Analyze wireless network trends

Similar program in the market place Things they do poorly : Airopeek: Looks perfect! Kismet: Poor graphical user interface Does not have enough security things

Who needs? WLAN administrators. Security professionals. Home users who are interested in monitoring their WLAN traffic.Wi-Fi Programmers developing software for wireless networks.