A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,

Slides:



Advertisements
Similar presentations
Man in the Middle Attack
Advertisements

SCADA Security, DNS Phishing
Attack Graphs for Proactive Digital Forensics Tara L. McQueen Delaware State University Louis P. Wilder Computational Sciences and Engineering Division.
I would like to thank Louis P. Wilder and Dr. Joseph Trien for the opportunity to work on this project and for their continued support. The Research Alliance.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Aleksandar Kuzmanovic & Edward W. Knightly A Performance vs. Trust Perspective in the Design of End-Point Congestion Control Protocols.
Demonstrating HTTP Session Hijacking through ARP Cache Poisoning and Man-in-the-Middle Attack and exploring HTTPS and VOIP session vulnerabilities Mainuddin.
ITIS3100 By Fei Xu. Acknowledge This document is basically a digest from “Wireshark User's Guide for Wireshark 1.0.0” You can download the software.
Scalable Server Load Balancing Inside Data Centers Dana Butnariu Princeton University Computer Science Department July – September 2010 Joint work with.
A Critical Infrastructure Testbed for Cybersecurity Research and Education Ai Onda, Kalana Pothuvila, Joseph Urban, and Jordan Berg Abstract Awareness.
Website Hardening HUIT IT Security | Sep
Sindhuri Juturu Department of Computer Science Texas Tech University
EXPLOITING SECURITY VULNERABILITIES IN A SMART GRID HOME AREA NETWORK USING HARDWARE SIMULATION Tyler Flack, Samujjwal Bhandari, and Susan Urban TEXAS.
 An Overview of IE 4382/5382 Cybersecurity for Information Systems Susan D. Urban, Ph.D Department of Industrial Engineering Texas Tech University Lubbock,
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Course Flow Diagrams May 2-3, 2013 Support.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
Lab #2 CT1406 By Asma AlOsaimi. "Security has been a major concern in today’s computer networks. There has been various exploits of attacks against companies,
Computer Security and Penetration Testing
Abstract A software development life cycle can be divided into requirements elicitation, specification, design, implementation, testing, and maintenance.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Abstract Plant phenotyping involves the assessment of plant traits such as growth, tolerance, resistance, and yield. The Texas Tech Phenotyping Project.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
Simulation of Fault Detection for Robot Applications Chase Baker, Taeghyun Kang, Michael Shin Ph.D. Interaction with robot applications are becoming increasingly.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Computer & Network Security
Case Study 2 – TeraBit Inc. DMico Johnson Hans Schmidt.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
Honeypot and Intrusion Detection System
1. Department of Arts and Sciences, Georgia State University 2. Department of Electrical and Computer Engineering, Texas Tech University 3. Department.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
CREATING A ZIGBEE HOME AREA NETWORK SIMULATOR FOR SMART GRID SECURITY RESEARCH Gabriel Garza, Samujjwal Bhandari, & Susan Urban Texas Tech University 2012.
I-Hack’08 International Hacking Competition “Details”
Dorothy Communication Dorothy Interface Robot Sensors Scribbler Robot(IPRE, 2010) Handler connection Background Dorothy, is a 3D/robotics programming environment.
Communication with Handler Approach Overview Alice 2.0 source code was modified to release event information to a robot handler component using sockets.
CHAPTER 9 Sniffing.
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
MAN-IN-THE-MIDDLE ATTACK STEGANOGRAPHY Lab# MAC Addresses and ARP  32-bit IP address:  network-layer address  used to get datagram to destination.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
How To Be nosey on the Interwebz. What you need Linux Laptop Local Wireless Network you want to do sniffing on ettercap Wireshark driftnet nmap.
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
King William High School. Cyber Security Curriculum 4 year high school curriculum Up to 5 technology certifications upon successful completion of each.
Re-evaluating the WPA2 Security Protocol
CSCE 548 Student Presentation By Manasa Suthram
Penetration Testing: Concepts,Attacks and Defence Stratagies
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Backdoor Attacks.
Systems Security Keywords Protecting Systems
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Firewalls.
Discussion and Conclusion
Optical Networks & Smart Grid Lab.
Clemson University: Jill Gemmill
Title of Poster Site Visit 2017 Introduction Results
Comparison to existing state of security experimentation
Cyber Security of SCADA Systems Remote Terminal Units (RTU)
Title of Poster Site Visit 2018 Introduction Results
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Ethical Hacker Pro IT Fundamentals Pro
Presentation transcript:

A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3, Susan D. Urban 4 1. Department of Computer Science, Shaw University 2. Department of Computer Engineering, Texas Tech University 3. Department of Electrical and Computer Engineering, Texas Tech University 4. Department of Industrial Engineering, Texas Tech University A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3, Susan D. Urban 4 1. Department of Computer Science, Shaw University 2. Department of Computer Engineering, Texas Tech University 3. Department of Electrical and Computer Engineering, Texas Tech University 4. Department of Industrial Engineering, Texas Tech University Texas Tech University 2014 NSF Research Experience for Undergraduates Site Program Background / Motivation  The conventional electric grid technology provides us with energy support to keep our businesses, schools, and homes powered. The current technology is outdated and will eventually be replaced by new innovation known as the Smart Grid.  Smart grid technology provides an efficient, reliable, and two- way transfer of energy and data throughout the grid.  The concept to smart grid technology is to allow us to better manage and preserve energy.  Cyber security is a main issue that needs to be addressed with the development of smart grid technology.  Technology is vulnerable, and there will be a need to keep HANs (Home Area Networks) safe from a cyber-security perspective once the smart grid is connected to homes. Methodology 1. The Process of Setting up a MITM attack (ARP Cache Poisoning).  Intercept packets - Trick victim machine(s) and switch on the network.  Poisoning the Arp table – Puts attacker in between the targeted systems to where they will intercept the packets.  Capturing Information – Software including: Wireshark, Ettercap, and Driftnet captures information once it is intercepted. 2. Counter Measuring MITM Attack using XArp.  XArp is an advanced Arp spoofing detection system that can be installed on Windows and Linux Operating Systems.  The application monitors incoming and outgoing Arp packets that are being processed on the network that it is connected to. It’s designed security algorithms determines if there is an attack on a particular system on the network based on how many Arp packets the system is receiving. Current Status  A virtual environment has been developed implementing Kali Linux, Windows XP, and Ubuntu operating systems.  Windows XP and Ubuntu Operating Systems have been penetrated by MITM attacks.  These attacks were processed to spoof and capture important information using Kali Linux and Wireshark.  A solution to stopping those attacks was installing XArp onto the systems to detect the attacks.  XArp has been valuable in detecting the MITM attacks processed on the network. Conclusion  There will be an immediate need for advanced security technology such as XArp to be factored into smart meters and HANs as the smart grid evolves.  Better Security technology will be significant in providing detection, prevention, and safety from MITM attacks on HANs. References 1.Smart Grid: A Beginner's Guide. (n.d.). Smart Gride: A Beginner's Guide. Retrieved June 26, 2014, from 2."Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution." Kali Linux. N.p., n.d. Web. 31 July Chrismc. XArp – Advanced ARP Spoofing Detection. 4.Weidman, Georgia. "Arp Cache Poisoning." Penetration Testing: A Hands-on Introduction to Hacking. 5.Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), Yang, Y., McLaughlin, K., Littler, T., Sezer, S., Im, E. G., Yao, Z. Q.,... & Wang, H. F. (2012). Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems. DISCLAIMER: This material is based upon work supported by the National Science Foundation and the Department of Defense under Grant No. CNS Any opinions, findings, and conclusions or recommendation expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation or the Department of Defense. Statement of the Problem  A vulnerable access point once HANs are connected to the smart grid is the smart meter. A smart meter is an advanced electric meter for communicating with devices inside of the home.  An adversary could manipulate the data of the smart meter that it is intended to receive or process.  An adversary who can penetrate the HAN system can performing a MITM (Man-in-the-middle) attack on the smart meter.  Protecting smart meters involves developing counter measures that will prevent insidious attacks such as MITM. Objectives  Construct a virtual environment using VMWare in which three operating systems will be installed to experiment with MITM attacks.  Kali Linux, a penetration testing system will be used to create MITM (Man-in-the-Middle) attacks.  XArp will be installed on the victim machines (Windows XP and Ubuntu) to detect the Arp based MITM attacks.  The purpose is to evaluate how targeted HAN systems can be penetrated by MITM attacks and develop a solution to preventing these attacks efficiently. Future Work  Create a HAN (Home Area Network) where a smart meter simulation is implemented to get real-time results on how MITM attacks can penetrate and affect the system.  This process will use an advanced network simulator to model a home area network and also need a program or code to be created to run a smart meter simulation.  An application such as XArp will be designed to detect and prevent MITM attacks on the smart meter of the HAN system. XArp may be potentially connected to the smart meter technology. Figure 1  Devices of the HAN. Figure 2  MITM attack (captured login credentials for FTP server). Figure 4  XArp detects MITM attack on network. Results 1.Systems that are in HANs can be exploited by MITM attacks.  RETRIEVE - MITM attacks managed to penetrate the systems of Windows XP and Ubuntu Operating Systems retrieving information and files that were essential.  REPLACE - Once the attacker was able to penetrate the system, it also made way for manipulating the files retrieved and replace them. 2.Applying vulnerable systems with counter measures.  When XArp was installed on these systems to prevent MITM attacks. The XArp application detected every attack that was processing through the networks.  The user was able to see in real-time how many Arp (Address Resolution Protocol) based MITM attacks were targeting their system.  XArp Professional detects the MITM attacks that are targeting the user’s system, and it also provides a structure of defense to secure the system from Arp based MITM attacks. Figure 3  Arp Cache Poisoning (Arp Spoofing)