Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.

Similar presentations


Presentation on theme: "Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005."— Presentation transcript:

1 Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005

2 Overview Popularity of Wireless Networks Benefits of Wireless Networks Vulnerabilities in Wireless Networks Some solutions to enhance security in wireless networks

3 Popularity of Wireless Networks Executives of 180 firms using more than 500 personal computers, 40 percent have already implemented wireless networks, while another 31 percent plan on rolling out wireless support in the next 18 months. (Wireless Ethernet Compatibility Alliance) More than 1 million WLAN access points are in use by more than 700,000 U.S. enterprises. (Yankee Group in Boston)

4 Wireless Technologies Wireless technologies allow devices to communicate without physical connections All data transmission is traveling over the medium of radio frequency wireless technologies are currently from one main standard: 802.11 The 802.11b standard is the first WLAN standard Other newer standards: 802.11a, 802.11g, 802.11n …etc

5

6 WLAN Standards TypeFrequencySpeedNotes 802.11b2.4GHz < 11Mbps 802.11a 5 GHz 54 Mbps 802.11g 2.4 GHz 54 Mbps Interoperable with 802.11b 802.11n Multiple frequencies 540 Mbps

7 Benefits of WLANs User Mobility: users now can be mobile yet retain high-speed, real-time access to the enterprise LAN Rapid Installation: time required for installation is reduced tremendously Flexibility: enterprises can now install and take down WLANs in their locations easily Scalability: WLAN network topologies can easily be configured to adapt specific business applications needs

8 Benefits of WLANs

9 Vulnerabilities in WLAN Easy Access Easy Access Rogue Access Points Rogue Access Points Unauthorized Use of Service Unauthorized Use of Service Service and Performance Constraints Service and Performance Constraints MAC Spoofing and Session Hijacking MAC Spoofing and Session Hijacking Traffic Analysis and Eavesdropping Traffic Analysis and Eavesdropping Higher Level Attacks Higher Level Attacks

10 Security Breaches Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Best Buy Co. ran into trouble in the spring of 2002 when customers who had purchased WLAN cards from Best Buy installed the cards in their laptops before they left the parking lot. The customers noticed unencrypted WLAN traffic that contained customer information and possibly credit card numbers.” (Ohrtman and Roeder) Netstumbler to identify unsafe WLANs Netstumbler to identify unsafe WLANs

11 Netstumbler Application

12 Security Breaches: Methods Wardriving Wardriving Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered Airsnort & WEPcrack passively monitor transmissions and compute the encryption key when enough packets have been gathered

13 How to Secure WLAN Enforce Strong Access Control Enforce Strong Access Control Regular Site Audits Regular Site Audits Design and Audit for Strong Authentication Design and Audit for Strong Authentication AuthenticityAuthenticity NonrepudiationNonrepudiation AccountabilityAccountability Adopt Strong Protocols Adopt Strong Protocols Perform Risk Analysis Perform Risk Analysis Protect the Core from the Wireless LAN Protect the Core from the Wireless LAN

14 Conclusion The only truly secure network is the one never built The only truly secure network is the one never built WLAN 802.11 protocols are still evolving to meet the needs of businesses WLAN 802.11 protocols are still evolving to meet the needs of businesses more vigilant due to new and open security holes when deploying wireless technologies more vigilant due to new and open security holes when deploying wireless technologies  Even though WLAN are becoming popular and a cost-effective alternative to traditional wired networks, reasonable precautions and vigilance must be taken in order to make wireless networks safe


Download ppt "Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005."

Similar presentations


Ads by Google