Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim.

Slides:



Advertisements
Similar presentations
Wireless LAN Security Understanding and Preventing Network Attacks.
Advertisements

Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Firewalls Anand Sharma Austin Wellman Kingdon Barrett.
(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Network Security Testing Techniques Presented By:- Sachin Vador.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
CS 550 Amoeba-A Distributed Operation System by Saie M Mulay.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security and Penetration Testing
COEN 252: Computer Forensics Router Investigation.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Lecture 11 Intrusion Detection (cont)
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
PROJECT IN COMPUTER SECURITY MONITORING BOTNETS FROM WITHIN FINAL PRESENTATION – SPRING 2012 Students: Shir Degani, Yuval Degani Supervisor: Amichai Shulman.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
Intrusion Detection Systems Present by Ali Fanian In the Name of Allah.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
COEN 252 Computer Forensics
1 Network Packet Generator Midway presentation Supervisor: Mony Orbach Presenting: Eugeney Ryzhyk, Igor Brevdo.
Intrusion Detection System for Wireless Sensor Networks: Design, Implementation and Evaluation Dr. Huirong Fu.
Improving Intrusion Detection System Taminee Shinasharkey CS689 11/2/00.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
WIRELESS INTRUSION DETECTION SYTEMS Namratha Vemuri Balasubramanian Kandaswamy.
COEN 252 Computer Forensics Collecting Network-based Evidence.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
Project Idea #1 Project: Simulation in NS Learn how to use NS-2 Examine 2-3 papers that do benchmark studies Implement a simulation of the Drexel TAARP.
Sujayyendhiren RS, Kaiqi Xiong and Minseok Kwon Rochester Institute of Technology Motivation Experimental Setup in ProtoGENI Conclusions and Future Work.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
What is a “Network Intrusion Detection System (NIDS)"?
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Linux Networking and Security
Client: The Boeing Company Contact: Mr. Nick Multari Adviser: Dr. Thomas Daniels Group 6 Steven BromleyJacob Gionet Jon McKeeBrandon Reher.
Fast NetServ Data Path: OpenFlow integration Emanuele Maccherani Visitor PhD Student DIEI - University of Perugia, Italy IRT - Columbia University, USA.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
Automatic Detection of Emerging Threats to Computer Networks Andre McDonald.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Solving the Security Risks of WLAN Tuukka Karvonen
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Intrusion Detection System
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
AP Waseem Iqbal.  DoS is an attack on computer or network that reduces, restricts or prevents legitimate of its resources  In a DoS attack, attackers.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
IDS Intrusion Detection Systems
COEN 152 / 252 Computer Forensics
Access control techniques
Presentation transcript:

Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim

Contents Project Description & Demo Competitors & Market Building Blocks & Project Timeline Challenges, Risks and Difficulty Level Product Testing Hardware and Software Requirements

Project Description

What is the product? An access point which can detect intruders and take counter measures Detection of Netstumbler Blocking / Jamming Netstumbler without affecting network performance Product will be open source and will integrate several available technologies

Project Demo Several computers on a wireless network Wireless network intruder using Netstumbler Three Phases Network setup Netstumbler and intrusion Intrusion detection and counter measures

Phase I – Network Setup 2-3 Linux machines setup with an access point to form a b network Data (packets) routed from linux machines to each other through AP Access point monitor used to detect source and destination of packets passing through the access point

Phase II – Intrusion Intrusion detection and jamming turned off Netstumbler used to access information on the wireless network Netstumbler captured packet information shown

Phase III – Intrusion Detection & Counter Measures Netstumbler packet detection Blocking of Netstumbler packets, RF jamming or fake AP barrage Data rate on wireless network measured w/ and w/o counter measures

User Interface Focus on proving the concept Open source allows end users to develop UI according to their needs Basic text-based user interface for testing, debugging and demo

Competitors & Market

Competitors Fake AP – Product developed by Black Alchemy. Used for flooding the wireless network with false AP beacon packets. Netstumbler gets overwhelmed with thousands of access points. Open Source, supported by linux.

Competitors (contd.) Air Defense – Enterprise/Military wireless intrusion detection system. Sold as a complete system which includes AirDefense sensors, server appliance. Does not take action against intruder, just monitors the network, and informs the administrator of any suspicious activity.

Price Fake AP is a freeware. Available at: keap/fake-ap.html keap/fake-ap.html AirDefense system costs between $19,000 to $25,000.

Our Product No product in the market today combines both Intrusion detection and response. Our product shall be freely available. This makes product unique and attractive to potential users.

Building Blocks Setup – Installing network cards on two linux machines, installing HostAP drivers, installing wireless sniffers, packet sniffer libraries. Detect NetStumbler – recognize netstumbler signature, UI design for reporting malicious activity.

Building Blocks (contd.) Counter-measures – - Logging event information (MAC, time, physical location) - Sending bogus AP information. - DoS Port to Open AP – combine detection and countermeasure and run it on an AP.

Building Blocks (contd.) OpenAP PC interface – write a TCP sockets client-server program. Allow network administrator to remotely configure and acquire information from Access Point.

Projected Timeline 12 weeks to complete.

Task Assignments

Challenges, Risks and Difficulty Level

Initial Setup – Challenges and Difficulty Lack of resources for experimental drivers Recompilation of kernel and other support packages Compatibility and interoperability of hardware

Initial Setup - Risk Project could be severely delayed if we are plagued with compatibility issues Incompatible hardware might require extra expenses to get different cards

Wardriving Detection – Challenges and Difficulty Limited storage memory Libpcap vs. low-level syscalls Development of algorithm for heuristic Wardriving detection

Wardriving Detection – Risks Inability to differentiate between Wardriver and legitimate client renders module useless Forced to resort to low-level syscalls without availability of experimental driver documentation

Countermeasure – Challenges and Difficulty Limited storage memory Countermeasures without affecting normal network performance Discovering new denial-of-service attacks attains Wardriving client

Porting to Access Point Different development framework Inaccessibility of access point Limited debug tools

Product Testing

Stage 1 : Wardriver Detection Reliable Wardriver detection Does not pick up legitimate traffic from a variety of wireless cards Logging

Stage 2 : Countermeasure Executed in parallel with Stage 1 Sufficiently confuses Wardriver Disables Wardriver Does not affect normal network traffic

Stage 3 : Access Point Remote deployment Durability (uptime) Status monitored remotely

Hardware and Software Requirements

Hardware Required 2x Linksys Wireless PC Card 1x Orinoco Gold Wireless Card 2x PCI-PC Card adapter USR 2450 Access Point Pretec 4MB Linear Mapped Card

Software Required Host AP Open AP Net Stumbler Ethereal Other scanners Other sniffers

Parts Designed and Adapted

Parts Adapted or Reused Host AP Open AP Fake AP

Parts Designed Intrusion detection algorithm Integration on Host AP Integration on Open AP