Agenda
ď‚— Uses
ď‚— Benefits
ď‚— Security Issues
ď‚— Solutions
ď‚— Conclusion
Uses
ď‚— Key drivers are mobility and accessibility
ď‚— Easily change work locations in the office
ď‚— Internet access at airports, cafes, conferences, etc.
Benefits
ď‚— Increased productivity
ď‚— Improved collaboration
ď‚— No need to reconnect to the network
ď‚— Ability to work in more areas
ď‚— Reduced costs
ď‚— No need to wire hard-to-reach areas
Security Issues and Solutions
ď‚— Sniffing and War Driving
ď‚— Rogue Networks
ď‚— Policy Management
ď‚— MAC Address
ď‚— SSID
ď‚— WEP
War Driving
ď‚— Default installation allow any wireless NIC to access
the network
ď‚— Drive around (or walk) and gain access to wireless
networks
ď‚— Provides direct access behind the firewall
ď‚— Heard reports of an 8 mile range using a 24dB gain
parabolic dish antenna.
Rogue Networks
ď‚— Network users often set up rogue wireless LANs to
simplify their lives
ď‚— Rarely implement security measures
ď‚— Network is vulnerable to War Driving and sniffing and
you may not even know it
Policy Management
ď‚— Access is binary
ď‚— Full network access or no network access
ď‚— Need means of identifying and enforcing access
policies
MAC Address
ď‚— Can control access by allowing only defined MAC
addresses to connect to the network
ď‚— This address can be spoofed
ď‚— Must compile, maintain, and distribute a list of valid
MAC addresses to each access point
ď‚— Not a valid solution for public applications
Service Set ID (SSID)
ď‚— SSID is the network name for a wireless network
 WLAN products common defaults: “101” for 3COM
and “tsunami” for Cisco
ď‚— Can be required to specifically request the access
point by name (lets SSID act as a password)
ď‚— The more people that know the SSID, the higher
the likelihood it will be misused.
ď‚— Changing the SSID requires communicating the
change to all users of the network
Wired Equivalent Privacy (WEP)
ď‚— Designed to be computationally efficient, self-
synchronizing, and exportable
ď‚— Vulnerable to attack
ď‚— Passive attacks to decrypt traffic based on statistical analysis
ď‚— Active attacks to inject new traffic from unauthorized mobile
stations, based on known plaintext
 Dictionary-building attack that, after analysis of a day’s worth of
traffic, allows real-time automated decryption of all traffic
ď‚— All users of a given access point share the same encryption
key
ď‚— Data headers remain unencrypted so anyone can see the
source and destination of the data stream
Conclusion
ď‚— Wireless LANs very useful and convenient, but current
security state not ideal for sensitive environments.
ď‚— Cahners In-Stat group predicts the market for wireless
LANs will be $2.2 billion in 2004, up from $771 million
in 2000.
ď‚— Growing use and popularity require increased focus on
security

Wireless lan security

  • 2.
    Agenda ď‚— Uses ď‚— Benefits ď‚—Security Issues ď‚— Solutions ď‚— Conclusion
  • 3.
    Uses ď‚— Key driversare mobility and accessibility ď‚— Easily change work locations in the office ď‚— Internet access at airports, cafes, conferences, etc.
  • 4.
    Benefits ď‚— Increased productivity ď‚—Improved collaboration ď‚— No need to reconnect to the network ď‚— Ability to work in more areas ď‚— Reduced costs ď‚— No need to wire hard-to-reach areas
  • 5.
    Security Issues andSolutions ď‚— Sniffing and War Driving ď‚— Rogue Networks ď‚— Policy Management ď‚— MAC Address ď‚— SSID ď‚— WEP
  • 6.
    War Driving ď‚— Defaultinstallation allow any wireless NIC to access the network ď‚— Drive around (or walk) and gain access to wireless networks ď‚— Provides direct access behind the firewall ď‚— Heard reports of an 8 mile range using a 24dB gain parabolic dish antenna.
  • 7.
    Rogue Networks ď‚— Networkusers often set up rogue wireless LANs to simplify their lives ď‚— Rarely implement security measures ď‚— Network is vulnerable to War Driving and sniffing and you may not even know it
  • 8.
    Policy Management ď‚— Accessis binary ď‚— Full network access or no network access ď‚— Need means of identifying and enforcing access policies
  • 9.
    MAC Address ď‚— Cancontrol access by allowing only defined MAC addresses to connect to the network ď‚— This address can be spoofed ď‚— Must compile, maintain, and distribute a list of valid MAC addresses to each access point ď‚— Not a valid solution for public applications
  • 10.
    Service Set ID(SSID)  SSID is the network name for a wireless network  WLAN products common defaults: “101” for 3COM and “tsunami” for Cisco  Can be required to specifically request the access point by name (lets SSID act as a password)  The more people that know the SSID, the higher the likelihood it will be misused.  Changing the SSID requires communicating the change to all users of the network
  • 11.
    Wired Equivalent Privacy(WEP)  Designed to be computationally efficient, self- synchronizing, and exportable  Vulnerable to attack  Passive attacks to decrypt traffic based on statistical analysis  Active attacks to inject new traffic from unauthorized mobile stations, based on known plaintext  Dictionary-building attack that, after analysis of a day’s worth of traffic, allows real-time automated decryption of all traffic  All users of a given access point share the same encryption key  Data headers remain unencrypted so anyone can see the source and destination of the data stream
  • 12.
    Conclusion ď‚— Wireless LANsvery useful and convenient, but current security state not ideal for sensitive environments. ď‚— Cahners In-Stat group predicts the market for wireless LANs will be $2.2 billion in 2004, up from $771 million in 2000. ď‚— Growing use and popularity require increased focus on security