SlideShare a Scribd company logo
1 of 13
Download to read offline
An improved authentication model
for IEEE 802.11 to prevent
Probe Request DoS Attacks.
Deepthi Ratnayake
(gdd0014@londonmet.ac.uk)
LMU PG Student Conference
12th Nov 2010
Topics
 Introduction
 Aim
 Design Flaws
 Experiment
 Test Bed
 Results
 Existing Countermeasures
 Future Research
Introduction
 What is IEEE 802.11?
 What is Probe Request & Response ?
Security
Policy
Agreement
Supplicant (STA)
Unauthenticated,
Unassociated, 8021.1X
Blocked
Authenticator (AP)
Unauthenticated,
Unassociated, 8021.1X
Blocked
1 - Beacon
1 - Probe Request
2 - Probe Response
3 - Authentication Request
4 - Authentication Response
6 - Association Response
5 - Association Request
Authenticated,
Associated, 8021.1X
Blocked, Security
Parameters
Authenticated,
Associated,
8021.1X Blocked,
Security Parameters
Authentication Phase of IEEE 802.11
Introduction
 What is a PRF Attack ?
 designed to manipulate 802.11 design flaws
 Sends a flood of PR frames using MAC spoofing to
represent a large number of nodes scanning the
wireless network
 So what happens?
 Serious performance degradation or prevent
legitimate users from accessing network
resources (DoS). DoS attacks are the most
common
Aim
To find an effective method to:
 recognise rogue Probe Request frames,
 and prevent an AP from triggering a Probe
Response.
Length -
Bytes
2 2 6 6 6 2 6 Variable Variable 4
Field
Frame
Control
Duration
ID
DA SA BSSID
Sequence
Control
SSID
Supported
Rates
Estended
Supported Rates
FCS
MAC HEADER FRAME BODY CRC
Length -
Bits
2 2 4 1 1 1 1 1 1 1 1
Field Protocol Version Type
Sub
Type
To DS From DS More Frag Retry
Power
Management
More
Data
WEP Reserved
FRAME CONTROL
Design Flaws
 each request message sent by a STA
must be responded with a response
message sent by the AP.
 Probe Request/Response frames are
unprotected.
Test Bed
BSS
Test1-PC (User)
Windows XP
Intel(R) PRO/Wireless LAN 2100 3B Mini
PCI Adapter
MAC: Intel_5b:dd:b3
Test3-PC (Attacker)
BackTrack4 (Linux)
MAC: Intel_a5:23:37
Test-AP (Access Point)
MAC: Netgrar_42:cf:c0
Test2-PC (User)
Windows Vista
Intel® PRO/Wireless 2200BG
Wireless Connection
MAC: Intel_39:c9:33
Sniffing & Injecting work !
Existing Countermeasures
 Cryptography
 Encryption
 long-term secret key
 Client Puzzle
 MAC Frame Fields
 Analysis of Sequence Number field.
 Change Re-try limit
 Response Delay
 NIC Profiling & Signal Finger Printing
 AI Models
The future research
 Keep a “Safe List” of known attributes and
give priority to “Safe List”.
 Pattern Recognition of “Transactions” and
filter peculiar Probe Requests.
Summary
 What is IEEE 802.11?
 What is Probe Request & Response ?
 What is a Probe Request Flooding Attack ?
 So what happens?
 Aim
 Design Flaws
 Experiment
 Existing Countermeasures
 Future Research
References
 Bicakci, K. and Tavli, B. (2009) Denial-of-Service attacks and countermeasures in IEEE
802.11 wireless networks, Computer Standards and Interfaces 31(5), pp931-941, [Online]
Available at http://www.sciencedirect.com [Accessed: 3rd October 2009].
 Faria, D.B. and Cheriton, D.R. (2006) Detecting identity-based attacks in wireless networks
using signal prints, Proceedings of the 5th ACM workshop on Wireless security, Los Angeles,
California [Online] Available at http://0-delivery.acm.org [Accessed: 30 November 2009].
 Liu, C. and Yu, J. (2008) Rogue access point based DoS attacks against 802.11 WLANs,
Fourth Advanced International Conference on Telecommunications, AICT '08., 8(13),
pp271-276, [Online] Available at: http://0-ieeexplore.ieee.org [Accessed: 10 October
2008].
 Malekzadeh, M. et al. (2007) Security improvement for management frames in IEEE 802.11
wireless networks, International Journal of Computer Science and Network Security, IJCSNS
7(6) [Online] Available at: http://citeseerx.ist.psu.edu [Accessed: 2 February 2010].
 Martinovic, I. et al. (2008) Wireless client puzzles in IEEE 802.11 networks: security by
wireless. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec
'08, New York [Online] Available at: http://0-doi.acm.org [Accessed: 31 March 2010].
Thank You
Deepthi Ratnayake
(gdd0014@londonmet.ac.uk)
LMU PG Student Conference
12th Nov 2010

More Related Content

Similar to Deepthi ratnayake

Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions inIJNSA Journal
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardIJCSIS Research Publications
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...CSCJournals
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXIJNSA Journal
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXIJNSA Journal
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxdonnajames55
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless securitySarath K Sukumar
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Speaking Engagements and Publications
Speaking Engagements and PublicationsSpeaking Engagements and Publications
Speaking Engagements and Publicationsrick mellendick
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...Codemotion
 
Wireless networks syllabus
Wireless networks syllabusWireless networks syllabus
Wireless networks syllabusnikshaikh786
 

Similar to Deepthi ratnayake (20)

Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Deepthi ratnayake
Deepthi ratnayakeDeepthi ratnayake
Deepthi ratnayake
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
Speaking Engagements and Publications
Speaking Engagements and PublicationsSpeaking Engagements and Publications
Speaking Engagements and Publications
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Wireless networks syllabus
Wireless networks syllabusWireless networks syllabus
Wireless networks syllabus
 

More from LondonMet PGR Students (20)

Sara cannizzaro
Sara cannizzaroSara cannizzaro
Sara cannizzaro
 
Inflation targeting misfiring on development of housing market bubble
Inflation targeting misfiring on development of housing market bubbleInflation targeting misfiring on development of housing market bubble
Inflation targeting misfiring on development of housing market bubble
 
Md kanu
Md kanuMd kanu
Md kanu
 
Jabeen shah
Jabeen shahJabeen shah
Jabeen shah
 
Glyn robbins
Glyn robbinsGlyn robbins
Glyn robbins
 
Robert gonouya
Robert gonouyaRobert gonouya
Robert gonouya
 
Janet bowstead poster
Janet bowstead posterJanet bowstead poster
Janet bowstead poster
 
Veronica azolukwam
Veronica azolukwamVeronica azolukwam
Veronica azolukwam
 
Veronica azolukwam
Veronica azolukwamVeronica azolukwam
Veronica azolukwam
 
Marta kaleta
Marta kaletaMarta kaleta
Marta kaleta
 
Tracy part
Tracy partTracy part
Tracy part
 
Shazaib butt
Shazaib buttShazaib butt
Shazaib butt
 
Ozlem edizel
Ozlem edizelOzlem edizel
Ozlem edizel
 
Thao nguyen
Thao nguyenThao nguyen
Thao nguyen
 
Qicheng yu
Qicheng yuQicheng yu
Qicheng yu
 
Mohammad khaleq newaz
Mohammad khaleq newazMohammad khaleq newaz
Mohammad khaleq newaz
 
Joycelyn adinkrah
Joycelyn adinkrahJoycelyn adinkrah
Joycelyn adinkrah
 
Janet bowstead
Janet bowsteadJanet bowstead
Janet bowstead
 
Syahnaz mohdmokhter
Syahnaz mohdmokhterSyahnaz mohdmokhter
Syahnaz mohdmokhter
 
Mokhter syahnaz
Mokhter syahnazMokhter syahnaz
Mokhter syahnaz
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 

Deepthi ratnayake

  • 1. An improved authentication model for IEEE 802.11 to prevent Probe Request DoS Attacks. Deepthi Ratnayake (gdd0014@londonmet.ac.uk) LMU PG Student Conference 12th Nov 2010
  • 2. Topics  Introduction  Aim  Design Flaws  Experiment  Test Bed  Results  Existing Countermeasures  Future Research
  • 3. Introduction  What is IEEE 802.11?  What is Probe Request & Response ? Security Policy Agreement Supplicant (STA) Unauthenticated, Unassociated, 8021.1X Blocked Authenticator (AP) Unauthenticated, Unassociated, 8021.1X Blocked 1 - Beacon 1 - Probe Request 2 - Probe Response 3 - Authentication Request 4 - Authentication Response 6 - Association Response 5 - Association Request Authenticated, Associated, 8021.1X Blocked, Security Parameters Authenticated, Associated, 8021.1X Blocked, Security Parameters Authentication Phase of IEEE 802.11
  • 4. Introduction  What is a PRF Attack ?  designed to manipulate 802.11 design flaws  Sends a flood of PR frames using MAC spoofing to represent a large number of nodes scanning the wireless network  So what happens?  Serious performance degradation or prevent legitimate users from accessing network resources (DoS). DoS attacks are the most common
  • 5. Aim To find an effective method to:  recognise rogue Probe Request frames,  and prevent an AP from triggering a Probe Response. Length - Bytes 2 2 6 6 6 2 6 Variable Variable 4 Field Frame Control Duration ID DA SA BSSID Sequence Control SSID Supported Rates Estended Supported Rates FCS MAC HEADER FRAME BODY CRC Length - Bits 2 2 4 1 1 1 1 1 1 1 1 Field Protocol Version Type Sub Type To DS From DS More Frag Retry Power Management More Data WEP Reserved FRAME CONTROL
  • 6. Design Flaws  each request message sent by a STA must be responded with a response message sent by the AP.  Probe Request/Response frames are unprotected.
  • 7. Test Bed BSS Test1-PC (User) Windows XP Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter MAC: Intel_5b:dd:b3 Test3-PC (Attacker) BackTrack4 (Linux) MAC: Intel_a5:23:37 Test-AP (Access Point) MAC: Netgrar_42:cf:c0 Test2-PC (User) Windows Vista Intel® PRO/Wireless 2200BG Wireless Connection MAC: Intel_39:c9:33
  • 9. Existing Countermeasures  Cryptography  Encryption  long-term secret key  Client Puzzle  MAC Frame Fields  Analysis of Sequence Number field.  Change Re-try limit  Response Delay  NIC Profiling & Signal Finger Printing  AI Models
  • 10. The future research  Keep a “Safe List” of known attributes and give priority to “Safe List”.  Pattern Recognition of “Transactions” and filter peculiar Probe Requests.
  • 11. Summary  What is IEEE 802.11?  What is Probe Request & Response ?  What is a Probe Request Flooding Attack ?  So what happens?  Aim  Design Flaws  Experiment  Existing Countermeasures  Future Research
  • 12. References  Bicakci, K. and Tavli, B. (2009) Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks, Computer Standards and Interfaces 31(5), pp931-941, [Online] Available at http://www.sciencedirect.com [Accessed: 3rd October 2009].  Faria, D.B. and Cheriton, D.R. (2006) Detecting identity-based attacks in wireless networks using signal prints, Proceedings of the 5th ACM workshop on Wireless security, Los Angeles, California [Online] Available at http://0-delivery.acm.org [Accessed: 30 November 2009].  Liu, C. and Yu, J. (2008) Rogue access point based DoS attacks against 802.11 WLANs, Fourth Advanced International Conference on Telecommunications, AICT '08., 8(13), pp271-276, [Online] Available at: http://0-ieeexplore.ieee.org [Accessed: 10 October 2008].  Malekzadeh, M. et al. (2007) Security improvement for management frames in IEEE 802.11 wireless networks, International Journal of Computer Science and Network Security, IJCSNS 7(6) [Online] Available at: http://citeseerx.ist.psu.edu [Accessed: 2 February 2010].  Martinovic, I. et al. (2008) Wireless client puzzles in IEEE 802.11 networks: security by wireless. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec '08, New York [Online] Available at: http://0-doi.acm.org [Accessed: 31 March 2010].
  • 13. Thank You Deepthi Ratnayake (gdd0014@londonmet.ac.uk) LMU PG Student Conference 12th Nov 2010