24
802.11n Sniffer Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk

802.11n Sniffer

  • Upload
    gino

  • View
    89

  • Download
    2

Embed Size (px)

DESCRIPTION

802.11n Sniffer. Design Overview Vladislav Mordohovich Igor Shtarev Luba Brouk. Foreword. 802.11n is the new emerging WiFi Standard No suitable Sniffer is in production (as far we know) - PowerPoint PPT Presentation

Citation preview

Page 1: 802.11n Sniffer

802.11n Sniffer

Design Overview

Vladislav Mordohovich

Igor Shtarev

Luba Brouk

Page 2: 802.11n Sniffer

Foreword

802.11n is the new emerging WiFi Standard

No suitable Sniffer is in production (as far we know)

This project’s aim is to create one and a General Overview of the design is presented in the following slides

Page 3: 802.11n Sniffer

General Design Overview

Two main componentsSniffer CoreReports Sever

The Core resides on the machine with the physical 802.11n interface or “winpicap” interface, simulating 802.11n card.

The Reports Server can be installed on any host with IP access to the Core component (.net framework required for GUI, if used)

Page 4: 802.11n Sniffer

General Design Overview (2)

The Core and the Reports Server are communicating via the Syslog Protocol:Standard Event reporting protocolOver UDP

Page 5: 802.11n Sniffer

General Illustration

Sniffer Core

IP NetworkIP Network

Reports Server

Page 6: 802.11n Sniffer

Sniffer Core

Directly interacts with the RadWin driver Directly interfaces with “winpicap”, wrapping

ethernet packets with 802.11n envelop, including MSDU/MPDU aggregation

Simple User Interface Local frame filtering Syslog client Local Report Database

Page 7: 802.11n Sniffer

Sniffer Core (2)

UI functionsStart sniffingStop sniffingConfigure Reports Server address (or disable

feature)Local Log enable / disableChoose “winpicap” interface to listen

Change working Frequency / Bandwith of driver.

Page 8: 802.11n Sniffer

Reports Server

Syslog Server Ethereal Compatible report Database,

including 802.11n format frames presentation

UI (platform independent version) or GUI (windows host with .net framework installed)Turn On/Off

Page 9: 802.11n Sniffer

Core Modules

RadWin driver interface Receives a frame via RadWin hook function Forwards the frame to local filter

Local Filter Filters frames – for example discards the data of

frames that are too big to be sent over Syslog Performs decryption of an encrypted frame Forwards the frame to Syslog Server via

Communication module or local database (depends on configuration)

Page 10: 802.11n Sniffer

Core Modules (cont.)

Local Database If enabled stores frames received from Local Filter

module Communication

Receives frames from local Filter and forwards them to Syslog Server

User Interface Configures the Core with user’s parameters

Local/Remote storage of frames Frequency

Page 11: 802.11n Sniffer

Reports Server Modules

Syslog Server Receives Syslog messages from the Core with 802.11n frames

as data. Forwards the 802.11n frame to the Local Filter

Local Filter Filters (if needed) the frame and stores the frame in the

Database Database

The actual storage of the frames: Simple log with 802.11n headers only Ethereal compatible log file (only for frames which were received

entirely from the Core – that is, their data was not removed)

Page 12: 802.11n Sniffer

Data Flow in Core component

A new frame is assembled by the RadWin driver and the hook function is called

The hook function forwards the frame to the Local Filter and returns as quickly as possible

The Local filter performs checks on the frame and decides if it should be filtered / processed

If the Filter decides to forward the frame (processed or not) it does it and delivers it (with appropriate flags) to: The Local Database, if so configured, or The Communication Module

The Communication module forwards the frame as a data of a Syslog packet to the Reports Server.

Page 13: 802.11n Sniffer

Data Flow in Syslog Server

The server receives a packet from the Core

After the analysis of the packet, the Server:Stores the received 802.11n frame in the

appropriate log (headers only / Ethereal compatible)

Page 14: 802.11n Sniffer

Development Schedule (Core)

System dependant code – ready RadWin driver interface – 5 days Local Filter – 5 days Local Database – 5 days Communication - 5 days

Page 15: 802.11n Sniffer

Development Schedule (Reports Server) System dependant code – 5 days Local Filter – 5 days Local Database – 5 days Communication - 5 days

Page 16: 802.11n Sniffer

OS independency

All modules are to be written in C++ with OS dependent functionality wrapped by C++ classes. This is in order to simplify code porting to another platform.

Page 17: 802.11n Sniffer

Security

The frame will include data which will be decrypted by a key, that is known to the sender, receiver and sniffer, which listens to the traffic.

The sniffer will use encrypting function and then parse the data.

Page 18: 802.11n Sniffer

Security (cont.)

The sender will encrypt the data, assuming:The sender and the receiver both will keep

array of decryption keysThe sender will send the index of the key

stored on the array.The receiver will use the same key to encrypt

dataThat means that keys, encryption and

decryption algorithms are known for both sides

Page 19: 802.11n Sniffer

Security (cont.) P- decrypted message, i-index of decryption key,

F- decryption function ,M-message, C – encryption function

P = F(M,Ki) – sender sends, P and i M = C(P,Ki) - receiver uses the encryption

function and gets the original message

1 n2

Keys array stored on both sides of connection

k1 k2 kn

Page 20: 802.11n Sniffer

Topology Discovery

A component of the project which’s aim is to discover and present the Network Topology

Is a part of the Core (but developed as a stand-alone application)

Page 21: 802.11n Sniffer

Topology Discovery Algorithm

A simplified version of the “Mesh-based Robust Topology Discovery Algorithm for Hybrid Wireless Networks” by Ranveer Chandra

http://www.cs.cornell.edu/people/ranveer/topology_tr.pdf

Page 22: 802.11n Sniffer

Topology Discovery Algorithm (2)

AssumptionsThe nodes are stationaryOne node collects the entire topology

Consists of two stepsThe Discovery stepThe Gathering step

Page 23: 802.11n Sniffer

Discovery Step Of The Algorithm

A coordinating node is initiating the algorithm

The initiating message is propagated to the entire reachable network and a Mesh is built.

Throughout the entire step the nodes collect information of their neighborhood.

Page 24: 802.11n Sniffer

Gathering Step Of The Algorithm

Each node uploads it’s entire information up the Mesh

Leaves’ information consists only of their immediate neighborhood

Other nodes’ information is the entire sub-network topology of the Mesh that they’re roots of – thus the Coordinator have the entire topology at the end of this step