MAANAS GODUGUNUR
SHASHANK PARAB
SAMPADA KARANDIKAR
Introduction to 802.11
Introduce DoS
Description of Attacks on OSI model
Study of DDoS
Case Study of Attack Tools
Prevention and Response
Attack Prevention Tools
802.11 wireless networks is one of the most attractive and fast growing networks.
Easy and fast deployment and installation.
Physical and Max data rate specification
802.11b, using the 2.4 GHz radio spectrum and 11 Mbps max data rate.
802.11a, using the 5 GHz radio spectrum and 54 Mbps max data rate.
802.11g, using the 2.4 GHz radio spectrum and 54 Mbps max data rate.
Security
802.11i Wireless Robust Security Network. This standard defines the wireless network security protocols.
Strong mutual authentication : The client and access point must cryptographically prove their identities to each other.
Messages must have data origin protection : It must be possible to prove that sender of a message is genuine and not a man-in-themiddle.
Messages must have data integrity protection :It must be possible to prove that messages are not altered in transit.
Messages must have confidentiality :The contents of messages must only be viewable by the sender and receiver.
Denial of Service
Absence of availability
Distributed Denial of Service
Problem with detection
Why is DoS in WLAN interesting?
Wireless applications are demonstrating exponential growth.
Jamming
Physical tampering
Collision
Corrupted ACK control message
Disassociation attacks
Duration field in RTS and CTS frames distribute Medium
Reservation information which is stored in a Net Allocation
Vector (NAV).
Defer on either NAV or “CCA” indicating Medium Busy
CSMA/CA : minimizes the likelihood of two devices transmitting simultaneously.
An attack against this vulnerability exploits the CCA function at the physical layer
Causes all WLAN nodes within range, both clients and access points (AP), to defer transmission of data for the duration of the attack.
When under attack, the device behaves as if the channel is always busy, preventing the transmission of any data over the wireless network.
The gradient portion of the attacker’s frame indicates time reserved by the duration field although no data is actually sent. Continually sending the attack frames back to back prevents other nodes from sending legitimate frames.
Flood the victim’s incoming buffers with a large number of queries or data so that the victim’s access to the network is crippled.
Different protocols used to cause flooding attacks
ICMP
DNS
Reflector is any IP host that will return a packet if sent a packet.
Attacker first locates a very large number of reflectors.
They orchestrate their slaves to send to the reflectors spoofed traffic purportedly coming from the victim, V.
The reflectors will in turn generate traffic from themselves to V.
1) File2Air
File2Air packet injector mainly used for sending deauthentication packets to the router.
2) WLAN-jack a) Use MAC address of Access Point b) Send deauthentication frames c) Send continuously d) Send to broadcast address or specific MAC e) Users are unable to reassociate with AP
Discard out of order segments
Emergency block of IP addresses for critical servers with a separate route
Extremely resilient packet filter
Firewalls like Cisco PIX have a built in capability to differentiate DoS traffic from good traffic.
Switches and Routers should have some rate limiting or ACL capability
ASIC based Intrusion Prevention System
Have the granularity to analyze the attacks and act like a circuit breaker in an automated way
Prevention via Proactive Testing.
Kismet
802.11 layer2 wireless network detector, sniffer, and intrusion detection system.
Can sniff 802.11b, 802.11a, and 802.11g traffic.
Snort
Open source network intrusion prevention and detection system
Utilizes a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods
Tweety Coaster Little Lady Baby DDoS Shield
Works on a concept of different accessing time by human visitor and bot attacker.
Can set it up minimum average time between one visitor visits and maximum visits in minimum time.