10
Why Wireless? The answer is simple: Reach users who are often on the move!

Why Wireless? The answer is simple: Reach users who are often on the move!

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Why Wireless? The answer is simple: Reach users who are often on the move!

Why Wireless?

The answer is simple: Reach userswho are often on the move!

Page 2: Why Wireless? The answer is simple: Reach users who are often on the move!

Fastest Growing Wireless Technologies

Page 3: Why Wireless? The answer is simple: Reach users who are often on the move!

Fastest Growing Wireless Customer

Page 4: Why Wireless? The answer is simple: Reach users who are often on the move!

Project Description

The project basically consists of three main components-Attacker, Defender, and Observer.

Our project scenario is the following:A user is using a wireless network service through Access Point, then Attacker will do DoS Attack on the wireless network. Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.

Page 5: Why Wireless? The answer is simple: Reach users who are often on the move!

An architecture to detect 802.11 Attackers

AP

User

User PDA

Cloud

Attacker

Mornitoring

Analyzer

Page 6: Why Wireless? The answer is simple: Reach users who are often on the move!

Components to achieve protecting 802.11 DOS attacks

•Monitoring wireless networking Between attacker and defender•Show what happen in the network graphically by using GUI

•Analyze vulnerabilities of 802.11 protocols•Setup various attack daemons to exploit critical security holes of 802.11.

•Analyze log files from the observer•Categorize attack patterns by using XML•Detect attackers•Report “under attack”

Attacker(sonjong) Defender(eunyong)

Observer(jaemoo)

Page 7: Why Wireless? The answer is simple: Reach users who are often on the move!

Features

Bare Essentials: DoS Attack program Decode captured frames

Filter the captured frames Report statistical data

Speed distributions Monitor real-time

utilization Scan all the available channels

Desired Features: Monitoring program properly works under all manufactured NIC.

Bells and Whistles: Auto detect attacker and not accept any packet from attacker.

Page 8: Why Wireless? The answer is simple: Reach users who are often on the move!

Similar program in the market place

AiroPeek NX($3495.00), kismet($0.00) etc.

Things they do well :SSID TreeComprehensive Support for all 802.11 standardsSecurity Audit TemplateReal-Time Expert AnalysisExpert MappingExpert ProblemFinderAnalyze wireless network trends

Page 9: Why Wireless? The answer is simple: Reach users who are often on the move!

Similar program in the market place

Things they do poorly :

Airopeek: Looks perfect!Kismet: Poor graphical user interface

Does not have enough security things

Page 10: Why Wireless? The answer is simple: Reach users who are often on the move!

Who needs?

WLAN administrators.

Security professionals.

Home users who are interested in monitoring their WLAN traffic.Wi-Fi

Programmers developing software for wireless networks.