Chapter 13-802.11 Network Security Architecture 802.11 Security Basics Legacy 802.11 security Robust Security Segmentation Infrastructure Security VPN.

Slides:



Advertisements
Similar presentations
Chapter 07 Designing and Implementing Security for WLAN
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Security in IEEE wireless networks Piotr Polak University Politehnica of Bucharest, December 2008.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
Final Presentation Presented By: Gal Leibovich Liran Manor Supervisor: Hai Vortman.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Wireless Network Security: WEP And Beyond Heidi Parsaye Jason DeVries Roxanne Ilse Heidi Parsaye - Jason DeVries - Roxanne Ilse.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Copyright Security-Assessment.com 2005 Wireless Security by Nick von Dadelszen.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
CWNA Guide to Wireless LANs, Third Edition Chapter 9: Wireless LAN Security Vulnerabilities.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Port Based Network Access Control
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Module 48 (Wireless Hacking)
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN wireless Security

Exam Essentials Define the concept of AAA. –Be able to explain the differences between authentication, authorization, and accounting and why each is needed for a WLAN network. Explain why data privacy and segmentation are needed. –Be able to discuss why data frames must be protected with encryption. Know the differences between the various encryption ciphers. Understand how VLANs and RBAC mechanisms are used to further restrict network resources. Understand legacy security. –Identify and understand Open System authentication and Shared Key authentication. Understand how WEP encryption works and all of its weaknesses. Explain the 802.1X/EAP framework. –Be able to explain all of the components of an 802.1X solution and the EAP authentication protocol. Understand that dynamic encryption key generation is a by-product of mutual authentication.

Exam Essentials Define the requirements of a robust security network (RSN). –Understand what the standard specifically defines for robust security and be able to contrast what is defend by both the WPA and WPA2 certifications. Understand TKIP/RC4 and CCMP/AES. –Be able to explain the basics of both dynamic encryption types and why they are the end result of an RSN solution. Explain VLANs and VPNs. –Understand that VLANs are typically used for wireless segmentation solutions. Define the basics of VPN technology and when it might be used in a WLAN environment.

Wireless Security Data Privacy and Authentication What attacks are there What defenses are there

Security basics Data Privacy Authentication, Authorization, Accounting Segmentation Monitoring Policy Pg 438

Security basics Wireless tend to be a portal to existing, secure networks Wireless needs to be protected as well –Too easy to capture Use authorization to prevent access to internal network resources –Then regular authentication for network resources i and the RSN improved the reputation of wireless Pg 438

Data Privacy Since wireless is in unlicensed frequency, easy to detect transmissions Data privacy is used to restrict access to the data –Encryption Algorithms –RC4 and AES Management Frames not encrypted The MSDU from the data frames is encrypted –Layer 2 encryption Pg 439

Authentication, Authorization, Accounting (AAA) Authentication –Verification of user identity and credentials Authorization –Granting access to network resources based on authentication Accounting –Tracking the use of network resources by users Pg 439

Authentication, Authorization, Accounting (AAA) i and the RSN provided AAA standards for wireless networks Accounting trail is necessary for many government regulation Pg 439

Segmentation Before good encryption on wireless networks, they were segmented (separated) from wired –Untrusted Still important to keep different kinds of traffic separate on the networks –Firewalls, routers, VPNS, VLANS –Wireless VLAN is mores common Related to Role Based Access Control (RBAC) Pg 440

Monitoring and Privacy Need to monitor network to prevent attacks Using a Wireless Intrusion Detection system can help Pg 440

Legacy Security Open System Authentication –Null authentication, everyone gets in Shared Key –Used the WEP key as source WEP key was static, and same for everyone. –Major security risk. Pg 440

Static WEP Wired Equivalent Privacy is layer 2 encryption –RC4 with 64 or 128 bit key Confidentiality, access control and data integrity were goals Static WEP was on both AP and clients –Up to 4 keys, but all must match Pg 442

Static WEP Pg 442 WEP runs a cyclic redundancy check (CRC) on the plaintext data that is to be encrypted and then appends the Integrity Check Value (ICV) to the end of the plaintext data. A 24-bit cleartext Initialization Vector (IV) is then generated and combined with the static secret key. WEP then uses both the static key and the IV as seeding material through a pseudorandom algorithm that generates random bits of data known as a keystream. These pseudorandom bits are equal in length to the plaintext data that is to be encrypted. The pseudorandom bits in the keystream are then combined with the plaintext data bits by using a Boolean XOR process. The end result is the WEP ciphertext, which is the encrypted data. The encrypted data is then prefxed with the cleartext IV. Figure 13.3 illustrates this process.

Static WEP Attacks –IV Collisions –Weak Key –Reinjection –Bit-Flipping Easy to crack WEP Pg 442

MAC Filters Have AP use only approved MAC addresses –Not part of the standard Too easy to spoof a MAC address –Use protocol analyzer to grab MAC address and then use it on your own machine Pg 444

SSID Cloaking Hide the SSID The SSID field appears blank in beacon frames and probe responses A protocol Analyzer will see the SSID field in actual data frames Pg 444

Robust Security The standard defines an enterprise authentication method as well as a method of authentication for home use. Requires the use of 802.1x/EAP for enterprise and use of PSK for SOHO Strong Encryption required as well –CCMP/AES –TKIP/RC4 Pg 445

Robust Security WiFi Alliance created WPA and WPA2 –WPA before i –WPA2 after Pg 445

Robust Security Network Robust Security Network Associations –How two stations authenticate and associate –Create dynamic encryption through a 4 way handshake CCMP/AES is mandatory TKIP/RC4 is optional RSN field is in the beacon –RSN Information Elelement –Defines supported cipher elements Pg 446

802.1x/EAP Not specific to wireless Port based authentication Three players Supplicant –Client that wants access Authenticator –System that accepts requests (AP) Authentication Server –Database of users –RADIUS server Pg 446

802.1x/EAP Pg 446

802.1x/EAP EAP allows for different authentication systems to be used Defines when traffic moves from the uncontrolled to the controlled port Pg 446

EAP Types Many EAP types –LEAP,PEAP, etc One way or mutual authentication –Mutual authentication usually requires the AP to provide a digital certificate to client that they can verify Pg 450

Dynamic Encryption Since 802.1x/EAP can provide for distribution on certificates it is often used to help with encryption Generate encryption keys during the authentication process –Much better than a static key that is used by everyone Keys are generated per session/per user –Every authentication, new key Pg 450

4 Way Handshake The RSNA process creates multiple keys –Group Master Key (GMK) –Pairwise Master Key (PMK) PMK can also be created from a Pre-Shared Key (PSK) Pg 452

WPA/WPA-2 Personal In 802.1x/EAP you need an authentication server –Like RADIUS Most SOHO implementations use pre- shared Keys (PSK) –PSK is still a security risk PSK isn’t used for encryption on all stations –Each creates own encryption keys Pg 453

Encryption Options TKIP uses RC4 –Like WEP –Optional solution Can help legacy devices support better encryption than WEP CCMP/AES –Much more secure –Requires hardware support Pg 453

Segmentation Dividing up network to restrict access to resources –VLANs –RBAC Pg 454

VLANs Common on wired networks With , map VLAN to specific SSIDs APs can support multiple SSIDs –Wireless VLANS Each VLAN has different access to internal network and other networks Pg 457

VLANs

RBAC Restrict Access to authorized users When set up with a WLAn controller, RBAC can divide access based on users, roles or permission Roles like sales or marketing Permissions –Layer 2 or 3 access –Layer 4-7 firewalls –Bandwidth When user authenticates, their access is dependant on user credentials –Like traditional wired networks Pg 457

Infrastructure Security Physical –Don’t want expensive APs walking away Interface Security –Limit access to the management functions –Turn off the ones not in use Pg 458

VPN Wireless Security VPNs were often used by systems before i Not recommended now since there are other measures Still required for remote access –When connecting through Public Hot Spots Pg 459

Layer 3 VPN VPNs use secure tunneling –Encapsulate one network layer packet in another –Encapsulated packet has “hidden” data Outside packet has public addresses for transmitting over network. Pg 459

Layer 3 VPN Pg 459

Exam Essentials Define the concept of AAA. –Be able to explain the differences between authentication, authorization, and accounting and why each is needed for a WLAN network. Explain why data privacy and segmentation are needed. –Be able to discuss why data frames must be protected with encryption. Know the differences between the various encryption ciphers. Understand how VLANs and RBAC mechanisms are used to further restrict network resources. Understand legacy security. –Identify and understand Open System authentication and Shared Key authentication. Understand how WEP encryption works and all of its weaknesses. Explain the 802.1X/EAP framework. –Be able to explain all of the components of an 802.1X solution and the EAP authentication protocol. Understand that dynamic encryption key generation is a by-product of mutual authentication.

Exam Essentials Define the requirements of a robust security network (RSN). –Understand what the standard specifically defines for robust security and be able to contrast what is defend by both the WPA and WPA2 certifications. Understand TKIP/RC4 and CCMP/AES. –Be able to explain the basics of both dynamic encryption types and why they are the end result of an RSN solution. Explain VLANs and VPNs. –Understand that VLANs are typically used for wireless segmentation solutions. Define the basics of VPN technology and when it might be used in a WLAN environment.