Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr....

12
Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang

Transcript of Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr....

Page 1: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Attacks and defense strategies in a wireless local

area network

Course: CSCI5235Instructor: Dr. Andrew T. YangStudent: Fan Yang

Page 2: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Agenda What is wireless local area network? 802.11 Wireless security Threats or attacks in wireless local

area network Defense strategies References

Page 3: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Wireless Local Area Network

Page 4: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

802.11 IEEE 802.11 is a set of standards for wireless local

area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public spectrum bands.

http://en.wikipedia.org/wiki/802.11

Page 5: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Wireless Security

In December 2004, a class of 100 undergraduates worked to map the city of Seattle, Washington over several weeks. They found 5,225 access points; 44% were secured with WEP encryption, 52% were open, and 3% were pay-for-access. [4]

Page 6: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Possible threats or attacks in wireless local area network

Observations on Packets Captured Rogue Access Points Spoofing Denial of Service (DoS) Attacks Man-In-The-Middle Attacks Weakness of WEP

Page 7: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Weakness of WEP

Wired Equivalent Privacy (WEP) WEP

RC4 64 bit 128 bit more secure (bit slower speed) Pass phrase

Wireless signals are easy to intercept and WEP security is fairly simple to crack given the right tools.

AirSnort, WEPCrack, AirCrack.

Page 8: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Weakness of WEP

Page 9: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Man-In-The-Middle Attacks

Page 10: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

Defense strategies Wi-Fi Protected Access (WPA and

WPA2) Against Spoofing Against Flooding attack Against Eavesdropping Against DoS attack Virtual Private Networks (VPN)

Page 11: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

WPA and WPA2

The recommended solution to WEP security problems is to switch to WPA2 or the less resource intensive WPA.One major improvement in the protocol over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. When combined with the much larger initialization vector, this provides greatly improved protection against the well-known key recovery attacks on WEP.RADIUS authentication

Page 12: Attacks and defense strategies in a wireless local area network Course: CSCI5235 Instructor: Dr. Andrew T. Yang Student: Fan Yang.

References 1) http://en.wikipedia.org/wiki/Wardriving 2) Lawan A. Mohammed and Biju Issac,

“DoS Attacks and Defense Mechanisms in Wireless Networks”, Mobile Technology, Applications and Systems, 2005 2nd International Conference on15-17 Nov. 2005 Page(s):8 pp.

3) Bradley Morgan, “Wireless Security Attacks and Defenses”, White paper, Available online: http://www.windowsecurity.com/whitepapers/Wireless-Security-Attacks-Defenses.html

4) Dan Schade, “Wireless Attacks and Defense”, Available online: http://www.infosecwriters.com/text_resources/pdf/Wireless_Attacks_DSchade.pdf