0% found this document useful (0 votes)
197 views40 pages

Chapter 7 - Wirless Security

This document contains a chapter about wireless security from a textbook on network management and security. It discusses basic concepts of wireless security including wireless network definitions and configurations. It covers risks of wireless networks like war driving and open ports. Finally, it discusses techniques for safe wireless LAN design like access point placement and network monitoring.

Uploaded by

zekarias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
197 views40 pages

Chapter 7 - Wirless Security

This document contains a chapter about wireless security from a textbook on network management and security. It discusses basic concepts of wireless security including wireless network definitions and configurations. It covers risks of wireless networks like war driving and open ports. Finally, it discusses techniques for safe wireless LAN design like access point placement and network monitoring.

Uploaded by

zekarias
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Network Management and

Security

Chapter 7

Wireless Security

Gebeyehu B. (Dr. of Eng.) Asct Professor

[email protected]

Network management and security Chapter 7


Chapter contents
Basic concept of wireless security

WLAN Definition, Configurations and Architecture (How


Wireless Works)

Risks of Wireless Open Ports

War-Driving and War-Chalking

SAFE WLAN Design Techniques and Considerations

Network management and security Chapter 7 2


Basic concept of wireless security
What are Wireless Networks?
A wireless network is the way that a computer is connected to a router
without a physical link.

Why do we need?
Facilitates mobility – You can use lengthy wires instead, but someone might
trip over them.

Why security?
Attacker may hack a victim’s personal computer and steal private data or may
perform some illegal activities or crimes using the victim’s machine and ID.
Also there's a possibility to read wirelessly transferred data (by using
sniffers)

The three security approaches are:


WEP (Wired Equivalent Privacy)
WPA (Wi-Fi Protected Access)
WPA2 (Wi-Fi Protected Access, Version 2)
Network management and security Chapter 7 3
Basic concept of wireless security
A wireless LAN or WLAN is a wireless local area network that
uses radio waves as its carrier.
The last link with the users is wireless, to give a network connection
to all users in a building or campus.
The backbone network usually uses cables
The wireless LAN connects to a wired
LAN
There is a need of an access point that
bridges wireless LAN traffic into the wired
LAN.
The access point (AP) can also act as a
repeater for wireless nodes, effectively
doubling the maximum possible distance
between nodes.

Network management and security Chapter 7 4


Basic concept of wireless security
Elements of a wireless network
base station
typically connected to wired network
relay - responsible for sending
packets between wired network and
wireless host(s) in its “area”
e.g., cell towers, 802.11 access points

wireless hosts
laptop, smartphone
run applications
network may be stationary (non-mobile) or
infrastructure mobile
wireless does not always mean
mobility

wireless link
typically used to connect mobile(s) to
base station
also used as backbone link
multiple access control (MAC)
protocol coordinates link access
various data rates, transmission
distance

Network management and security Chapter 7 5


Basic concept of wireless security
Elements of a wireless network

infrastructure mode
base station connects mobiles into
wired network
handoff: mobile changes base
station providing connection into
wired network

network
infrastructure

Network management and security Chapter 7 6


Basic concept of wireless security
Wireless LANs very useful and convenient, but current security state
not ideal for sensitive environments.
Growing use and popularity require increased focus on security
concerns for wireless security are similar to those found in a wired
environment
security requirements are the same:
confidentiality, integrity, availability, authenticity, accountability
most significant source of risk is the underlying communications medium

Key factors contributing to higher security risk of wireless networks


Channel
Wireless networking typically involves broadcast communications, which is far
more susceptible to eavesdropping and jamming than wired networks
Wireless networks are also more vulnerable to active attacks that exploit
vulnerabilities in communications protocols
Mobility
Wireless devices are far more portable and mobile, thus resulting in a number of
risks
Network management and security Chapter 7 7
Basic concept of wireless security
Key factors contributing to higher security risk of wireless networks
Resources
Some wireless devices, such as smartphones and tablets, have
sophisticated operating systems but limited memory and processing
resources with which to counter threats, including denial of service and
malware
Accessibility
Some wireless devices, such as sensors and robots, may be left
unattended in remote and/or hostile locations, thus greatly increasing their
vulnerability to physical attacks

Uses
Key drivers are mobility and accessibility
Easily change work locations in the office
Increased productivity
Improved collaboration
No need to reconnect to the network Reduced costs
Ability to work in more areas No need to wire hard-to-reach areas
Network management and security Chapter 7 8
Basic concept of wireless security
The WLAN security wheel

An effective wireless security policy works to ensure that the network assets of the
organization are protected from sabotage and from inappropriate access, which
includes both intentional and accidental access.

All wireless security features should be configured in compliance with the security
policy of the organization.

If a security policy is not present, or if the policy is out of date, the policy should
be created or updated before deciding how to configure or deploy wireless
devices.
Chapter 7 9
WLAN Definition, Configurations and Architecture
(How Wireless Works)

Network management and security Chapter 7 10


WLAN Definition, Configurations and Architecture
(How Wireless Works)
Basic Configuration
WLAN Communication
WLAN Packet Structure

Basic configuration
Most wireless access points are easily
accessible.
They are usually located near users and
outside of locked rooms.
This puts wireless access points at special
risk for theft and for compromise by
malicious users.
Network monitoring can be used to
determine when an access point goes off.
Proper procedures will need to be followed
to determine what happened to the
equipment.
Almost all wireless vendors publish the
methods of resetting an access point using
reset buttons or the console port.
Network management and security Chapter 7 11
WLAN Definition, Configurations and Architecture
(How Wireless Works)
WLAN Communication

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)


instead of Collision Detection
WLAN adapter cannot send and receive traffic at the same time
on the same channel
Hidden Node Problem

Four-Way Handshake
Security Issues and Solutions
Sniffing and War Driving
Rogue Networks
Policy Management SSID
MAC Address WEP

Network management and security Chapter 7 12


WLAN Definition, Configurations and Architecture
(How Wireless Works)
Basic WLAN architecture
Service set ID (SSID)
SSID is the network name for a
wireless network
WLAN products common
defaults: “101” for 3COM and
“tsunami” for Cisco
Can be required to specifically
request the access point by
name (lets SSID act as a
password)

The more people that know the


SSID, the higher the likelihood
it will be misused.

Changing the SSID requires


communicating the change to
all users of the network
Network management and security Chapter 7 13
WLAN Definition, Configurations and Architecture
(How Wireless Works)
Wired equivalent privacy (WEP)
Designed to be computationally efficient, self-synchronizing, and
exportable

Vulnerable to attack
Passive attacks to decrypt traffic based on statistical analysis
Active attacks to inject new traffic from unauthorized mobile stations,
based on known plaintext
Dictionary-building attack that, after analysis of a day’s worth of traffic,
allows real-time automated decryption of all traffic

All users of a given access point share the same encryption key

Data headers remain unencrypted so anyone can see the source


and destination of the data stream

Network management and security Chapter 7 14


WLAN Definition, Configurations and Architecture
(How Wireless Works)

WLAN Implementaion

Varies due to organization size and security concerns

Rapidly becoming very popular.

This is due to many characteristics such as:


Need for mobility.
Cost effectiveness.
Convenience.
Rapid deployment ability.
Decrease in size of electronic and digital equipment.
Speed of mobile computing devices.

Network management and security Chapter 7 15


WLAN Definition, Configurations and Architecture
(How Wireless Works)
Type of WLAN
LAN Extension:
Provide wireless connections of mobile computing units to a wired network.
Used in manufacturing, stock exchange, and warehouses.
Cross-building Interconnect:
Used to provide wireless connections between buildings.
Uses microwave communications with dish shaped antennas.
More of a link than a LAN.
Nomadic Access:
Used to provide connectivity from mobile units such as a laptop, PDA or
other computing devices to a fixed campus network per example.
Ad Hoc Networking:
Also called rapidly deployable networks.
An increasingly popular form of establishing networks between mobile
computing devices, such as laptops, computers inside moving vehicles.
The temporary wireless network is established dynamically on the fly.
Chapter 7 16
Risks of Wireless Open Ports

Network management and security Chapter 7 17


Risks of Wireless Open Ports
Wireless attack methods can be broken up into three categories:
Reconnaissance
Access attack
Denial of Service (DoS)

Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems,
services, or vulnerabilities.

Not usually illegal, but is illegal in some countries.

It is also known as information gathering and it usually precedes an actual


access or DoS attack.

Reconnaissance is similar to a thief scouting a neighborhood for unsecure


homes.

Wireless reconnaissance is often called war-driving.

Network management and security Chapter 7 18


Risks of Wireless Open Ports
Wireless attack methods can be broken up into three categories:
Reconnaissance
Access attack
Denial of Service (DoS)

Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems,
services, or vulnerabilities.

Not usually illegal, but is illegal in some countries.

It is also known as information gathering and it usually precedes an actual


access or DoS attack.

Reconnaissance is similar to a thief scouting a neighborhood for unsecure


homes.

Wireless reconnaissance is often called war driving.

Network management and security Chapter 7 19


Risks of Wireless Open Ports
Access attack
System access, in this context, is the ability for an unauthorized intruder to
gain access to a device for which the intruder does not have an account or
password.
Entering or accessing systems to which one does not have authorized access
usually involves running a hack script or tool that exploits a known
vulnerability of the system or application being attacked.
Includes
Exploitation of weak or non-existent passwords
Exploitation of services such as HTTP, FTP, SNMP, CDP, and Telnet.

Wired Equivalent Privacy (WEP) Attacks


Attacks against WEP include Bit Flipping, Replay Attacks, and Weak IV
collection.
Many WEP attacks have not been released from the laboratory, but they are
well documented.
One utility, called AirSnort, captures weak Initialization Vectors to determine
the WEP key being used.
Network management and security Chapter 7 20
Risks of Wireless Open Ports
Denial of service (DoS)
DoS is when an attacker disables
or corrupts wireless networks,
systems, or services, with the
intent of denying the service to
authorized users.

DoS attacks take many forms.

In most cases, performing the


attack simply involves running a
hack, script, or tool.

Network management and security Chapter 7 21


Risks of Wireless Open Ports
How to make your wireless network secure?

Access Control Lists


Base on MAC address
Configure AP to only allow connection from ‘trusted’ stations with the
right MAC address
Most vendors support this, although not in the standard

Use WEP encryption/decryption as authentication mechanism

Use WEP to encrypt data transmitted to guard against


eavesdropping

Network management and security Chapter 7 22


Risks of Wireless Open Ports
Secure WLAN
Intent to protect link between wireless client and (assumed) more
secure wired network

Similar to a VPN and provides server authentication, client


authentication, data privacy, and integrity using per session and
per user short life keys

Simpler and more cost efficient than a VPN

Cross-platform support and interoperability, not highly scaleable,


though

Supports Linux and Windows

Open Source (slan.sourceforge.net)

Network management and security Chapter 7 23


Risks of Wireless Open Ports
Secure WLAN
Things to keep in mind when securing a WLAN

All WLAN should be considered insecure, and thus should be


treated that way

Never put a WLAN within the perimeter of your wired LAN’s


firewall

Use WEP, it will deter most would be trespassers

Do not leave default WEP key

Implement 802.1X with key rotation every 5 to 10 minutes

Combine security mechanisms.


Network management and security Chapter 7 24
Risks of Wireless Open Ports
Secure WLAN
Security Service Dependencies
Authentication

Authorization

Data Integrity Data Confidentiality

Network management and security Chapter 7 25


Risks of Wireless Open Ports
Authentication and association

Probe Authentication Association


process process process
Successful Successful
Authentication Association

State 1 State 2 State 3


Unauthenticated Authenticated Authenticated
Unassociated Unassociated Associated
Deauthentication Disassociation

Open Authentication and Shared Key Authentication are the two methods that the
802.11 standard defines for clients to connect to an access point.
The association process can be broken down into three elements known as probe,
authentication, and association.
This section will explain both authentication methods.

Network management and security Chapter 7 26


Risks of Wireless Open Ports
Open authentication

Open Authentication is basically a null authentication, which means there is


no verification of the user or machine.

Network management and security Chapter 7 27


Risks of Wireless Open Ports
Authentication process

On a wired network, authentication is implicitly provided by the physical cable


from the PC to the switch.
Authentication is the process to ensure that stations attempting to associate with
the network (AP) are allowed to do so.
802.11 specifies two types of authentication:
Open-system
Shared-key (makes use of WEP)

Network management and security Chapter 7 28


Risks of Wireless Open Ports
Data integrity
The MIC is a feature used to augment the ineffective Integrity Check Value
(ICV) of 802.11 standard. (More to be added on this at a later date.)
The MIC solves vulnerabilities such as the frame tampering/bit flipping
attacks (to be added later).
The IEEE has proposed a specific algorithm, Michael, to augment the ICV
function in the encryption of 802.11 data frames.
The MIC is a unique key that differs from the key used to encrypt data frames.
This unique key is mixed with the destination MAC address and the source
MAC address from the frame as well as the entire unencrypted data payload
of the frame.

Network management and security Chapter 7 29


Risks of Wireless Open Ports
Security solution
Wired Equivalent Privacy (WEP) and WEP2

Media access control (MAC) addresses: configuring access


points to permit only particular MAC addresses onto the
network. Easy to implement, but fairly easy to defeat.

IEEE 802.1X: This standard, supported by Windows XP, defines


a framework for MAC-level authentication. Susceptible to
session-hijacking and man-in-the-middle attacks.

VPNs: using a VPN to encrypt data on wireless networks. VPNs


require a lot of management and client configuration.

User authentication

The Temporal Key Integrity Protocol (TKIP) [IEEE 802.11i]


Network management and security Chapter 7 30
Risks of Wireless Open Ports
Security solution
Advanced Encryption Standard (AES) encryption [IEEE
802.11i]

"Key-hopping" technology that can change the encryption key as


often as every few seconds.

EAP-TTLS (Extensible Authentication Protocol (EAP) -


Tunneled Transport Layer Security)

Enhanced Security Network (ESN) - Extended Service Set with

enhanced authentication mechanism for both STAs and APs based on


802.11x
key management
dynamic, association-specific cryptographic keys
enhanced data encapsulation using AES

Network management and security Chapter 7 31


Risks of Wireless Open Ports
Security solution

Wireless Protocol Analyzers. They can:

check for unknown MAC (Media Access Control) addresses and alert the
network manager

log attempts to gain unauthorized access to the network

filter access attempts based on the type of network card

conduct site survey of traffic usage

find dead zones in the wireless network

Network management and security Chapter 7 32


War-Driving and War-Chalking

Network management and security Chapter 7 33


War-Driving and War-Chalking
Default installation allow any wireless NIC to access the network
Drive around (or walk) and gain access to wireless networks
Provides direct access behind the firewall
War driving is a security issue, which is a trip or momentarily loss
of balance or walk unsteadily,
Network is vulnerable to War Driving and sniffing and even we
may not know it
As the solution of such issues, mean that as to be safe, ethical, and
legal stumbling, there are rules that we need to knows.
Do not connect: at no time should you ever connect to any AP's that are not
your own. Disable client managers and TCP/IP stacks to be sure. Simply
associating can be interpreted as computer trespass by law enforcement.
Obey traffic laws: it is the traffic laws that for everyone's safety including
your own. Doing doughnuts at 3am gets unwanted attention from the
authorities anyways.
Network management and security Chapter 7 34
War-Driving and War-Chalking
As the solution of such issues, mean that as to be safe, ethical, and
legal stumbling, there are rules that we need to knows.

Obey private property and no-trespassing signs: Don't trespass in order to


scan an area. That's what the directional antenna is for :) You wouldn't want
people trespassing on your property

Don't use your data for personal gain: Share the data with like-minded
people, show it to people who can change things for the better, use it for
education but don't try and make any money or status off your data.

Be like the hiker motto of 'take only pictures, leave only footprints':
Detecting SSID's and moving on is legal, anything else is irresponsible to
yourself and your community.

Speak intelligently to others: When telling others about war-driving and


wireless security, don't get sensationalistic.

Network management and security Chapter 7 35


SAFE WLAN Design Techniques and Considerations

Network management and security Chapter 7 36


SAFE WLAN Design Techniques and Considerations
Change router default user name and password

Change the internal IP subnet if possible

Change default name and hide broadcasting of the SSID (Service


Set Identifier)

None of the attack methods are faster or effective when a larger


passphrase is used.

Restrict access to your wireless network by filtering access based


on the MAC (Media Access Code) addresses

Use Encryption

Network management and security Chapter 7 37


SAFE WLAN Design Techniques and Considerations
Basic techniques and considerations

Access Control
Ensure that your wireless infrastructure is not used.

Data Integrity
Ensure that your data packets are not modified in transit.

Confidentiality
Ensure that contents of your wireless traffic is not leaked.

Understanding the WEP


WEP relies on a secret key which is shared between the sender (mobile
station) and the receiver (access point).
Secret Key : packets are encrypted using the secret key before they are
transmitted.
Integrity Check : it is used to ensure that packets are not modified in transit

Network management and security Chapter 7 38


SAFE WLAN Design Techniques and Considerations
.

allow only specific


computers to
use encryption
access your
wireless network

use anti-virus and change your


anti-spyware router’s pre-set
software and a password for
firewall administration

change the
turn off identifier identifier on your
broadcasting router from the
default

Network management and security Chapter 7 39


End!

Network management and security Chapter 7 40

You might also like