802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk.

Slides:



Advertisements
Similar presentations
Fraunhofer FOKUS 2007 VoIP Defender The Future of VoIP Protection Fraunhofer FOKUS Institute, Germany.
Advertisements

Exercises and Solutions Lecture 1
Communication Networks Recitation 3 Bridges & Spanning trees.
(4.4) Internet Protocols Layered approach to Internet Software 1.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
802.11n Sniffer Vladislav Mordohovich Igor Shtarev.
Lesson 1: Configuring Network Load Balancing
1 K. Salah Module 4.3: Repeaters, Bridges, & Switches Repeater Hub NIC Bridges Switches VLANs GbE.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Network File System. 2 Network Services A Linux system starts some services at boot time and allow other services to be started up when necessary. These.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Automatic Software Testing Tool for Computer Networks ARD Presentation Adi Shachar Yaniv Cohen Dudi Patimer
Ch. 5 – Access Points. Overview Access Point Connection.
Network Administration
Using ns-3 emulation to experiment with Wireless Mesh Network Routing: Lessons learned José Núñez-Martínez Research Engineer Centre Tecnologic de Telecomunicacions.
ECE 544 Project3 Kush Patel Siddharth Paradkar Ke Dong.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Chapter 17 Networking Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Web application architecture
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
The OSI Model.
Internet Ethernet Token Ring Video High Speed Router Host A: Client browser: REQUEST:http//mango.ee.nogradesu.edu/c461.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Computer Emergency Notification System (CENS)
Linux Networking and Security
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
Simulation of the OLSRv2 Protocol First Report Presentation.
Management of the LHCb DAQ Network Guoming Liu * †, Niko Neufeld * * CERN, Switzerland † University of Ferrara, Italy.
Chapter 9 Hardware Address & Frame Type Identification Hardware address of frame Addressing schemes Ethernet Frame header format.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Computer Communication: An example What happens when I click on
Project 3 Overview Spring 2010 Recitation #9.
Networking Components Assignment 3 Corbin Watkins.
INTRODUCTION TO THE INTERNET Internet Protocol Cameras Training: Session 1.
Data Communication Network Models
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Functions of Operating Systems V1.0 (22/10/2005).
CCNA Routing and Switching Routing and Switching Essentials v6.0
NOX: Towards an Operating System for Networks
100% REAL EXAM QUESTIONS ANSWERS
Understand Networking Services
CHAPTER 3 Architectures for Distributed Systems
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
CT1303 LAN Rehab AlFallaj.
Chapter 3: Windows7 Part 4.
Packet Sniffing.
* Essential Network Security Book Slides.
Introduction to Packet Sniffing using Ethereal
Chapter 10: Device Discovery, Management, and Maintenance
TCP/IP Networking An Example
Presentation transcript:

802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk

Foreword n is the new emerging WiFi Standard No suitable Sniffer is in production (as far we know) This project’s aim is to create one and a General Overview of the design is presented in the following slides

General Design Overview Two main components  Sniffer Core  Reports Sever The Core resides on the machine with the physical n interface or “winpicap” interface, simulating n card. The Reports Server can be installed on any host with IP access to the Core component (.net framework required for GUI, if used)

General Design Overview (2) The Core and the Reports Server are communicating via the Syslog Protocol:  Standard Event reporting protocol  Over UDP

General Illustration Sniffer Core IP Network Reports Server

Sniffer Core Directly interacts with the RadWin driver Directly interfaces with “winpicap”, wrapping ethernet packets with n envelop, including MSDU/MPDU aggregation Simple User Interface Local frame filtering Syslog client Local Report Database

Sniffer Core (2) UI functions  Start sniffing  Stop sniffing  Configure Reports Server address (or disable feature)  Local Log enable / disable  Choose “winpicap” interface to listen Change working Frequency / Bandwith of driver.

Reports Server Syslog Server Ethereal Compatible report Database, including n format frames presentation UI (platform independent version) or GUI (windows host with.net framework installed)  Turn On/Off

Core Modules RadWin driver interface  Receives a frame via RadWin hook function  Forwards the frame to local filter Local Filter  Filters frames – for example discards the data of frames that are too big to be sent over Syslog  Performs decryption of an encrypted frame  Forwards the frame to Syslog Server via Communication module or local database (depends on configuration)

Core Modules (cont.) Local Database  If enabled stores frames received from Local Filter module Communication  Receives frames from local Filter and forwards them to Syslog Server User Interface  Configures the Core with user’s parameters Local/Remote storage of frames Frequency

Reports Server Modules Syslog Server  Receives Syslog messages from the Core with n frames as data.  Forwards the n frame to the Local Filter Local Filter  Filters (if needed) the frame and stores the frame in the Database Database  The actual storage of the frames: Simple log with n headers only Ethereal compatible log file (only for frames which were received entirely from the Core – that is, their data was not removed)

Data Flow in Core component A new frame is assembled by the RadWin driver and the hook function is called The hook function forwards the frame to the Local Filter and returns as quickly as possible The Local filter performs checks on the frame and decides if it should be filtered / processed If the Filter decides to forward the frame (processed or not) it does it and delivers it (with appropriate flags) to:  The Local Database, if so configured, or  The Communication Module The Communication module forwards the frame as a data of a Syslog packet to the Reports Server.

Data Flow in Syslog Server The server receives a packet from the Core After the analysis of the packet, the Server:  Stores the received n frame in the appropriate log (headers only / Ethereal compatible)

Development Schedule (Core) System dependant code – ready RadWin driver interface – 5 days Local Filter – 5 days Local Database – 5 days Communication - 5 days

Development Schedule (Reports Server) System dependant code – 5 days Local Filter – 5 days Local Database – 5 days Communication - 5 days

OS independency All modules are to be written in C++ with OS dependent functionality wrapped by C++ classes. This is in order to simplify code porting to another platform.

Security The frame will include data which will be decrypted by a key, that is known to the sender, receiver and sniffer, which listens to the traffic. The sniffer will use encrypting function and then parse the data.

Security (cont.) The sender will encrypt the data, assuming:  The sender and the receiver both will keep array of decryption keys  The sender will send the index of the key stored on the array.  The receiver will use the same key to encrypt data  That means that keys, encryption and decryption algorithms are known for both sides

Security (cont.) P- decrypted message, i-index of decryption key, F- decryption function,M-message, C – encryption function P = F(M,Ki) – sender sends, P and i M = C(P,Ki) - receiver uses the encryption function and gets the original message 1n2 … Keys array stored on both sides of connection k1 k2kn

Topology Discovery A component of the project which’s aim is to discover and present the Network Topology Is a part of the Core (but developed as a stand-alone application)

Topology Discovery Algorithm A simplified version of the “Mesh-based Robust Topology Discovery Algorithm for Hybrid Wireless Networks” by Ranveer Chandra opology_tr.pdf opology_tr.pdf

Topology Discovery Algorithm (2) Assumptions  The nodes are stationary  One node collects the entire topology Consists of two steps  The Discovery step  The Gathering step

Discovery Step Of The Algorithm A coordinating node is initiating the algorithm The initiating message is propagated to the entire reachable network and a Mesh is built. Throughout the entire step the nodes collect information of their neighborhood.

Gathering Step Of The Algorithm Each node uploads it’s entire information up the Mesh Leaves’ information consists only of their immediate neighborhood Other nodes’ information is the entire sub- network topology of the Mesh that they’re roots of – thus the Coordinator have the entire topology at the end of this step