SlideShare a Scribd company logo
1 of 13
Download to read offline
An improved authentication model
for IEEE 802.11 to prevent
Probe Request DoS Attacks.
Deepthi Ratnayake
(gdd0014@londonmet.ac.uk)
LMU PG Student Conference
12th Nov 2010
Topics
 Introduction
 Aim
 Design Flaws
 Experiment
 Test Bed
 Results
 Existing Countermeasures
 Future Research
Introduction
 What is IEEE 802.11?
 What is Probe Request & Response ?
Security
Policy
Agreement
Supplicant (STA)
Unauthenticated,
Unassociated, 8021.1X
Blocked
Authenticator (AP)
Unauthenticated,
Unassociated, 8021.1X
Blocked
1 - Beacon
1 - Probe Request
2 - Probe Response
3 - Authentication Request
4 - Authentication Response
6 - Association Response
5 - Association Request
Authenticated,
Associated, 8021.1X
Blocked, Security
Parameters
Authenticated,
Associated,
8021.1X Blocked,
Security Parameters
Authentication Phase of IEEE 802.11
Introduction
 What is a PRF Attack ?
 designed to manipulate 802.11 design flaws
 Sends a flood of PR frames using MAC spoofing to
represent a large number of nodes scanning the
wireless network
 So what happens?
 Serious performance degradation or prevent
legitimate users from accessing network
resources (DoS). DoS attacks are the most
common
Aim
To find an effective method to:
 recognise rogue Probe Request frames,
 and prevent an AP from triggering a Probe
Response.
Length -
Bytes
2 2 6 6 6 2 6 Variable Variable 4
Field
Frame
Control
Duration
ID
DA SA BSSID
Sequence
Control
SSID
Supported
Rates
Estended
Supported Rates
FCS
MAC HEADER FRAME BODY CRC
Length -
Bits
2 2 4 1 1 1 1 1 1 1 1
Field Protocol Version Type
Sub
Type
To DS From DS More Frag Retry
Power
Management
More
Data
WEP Reserved
FRAME CONTROL
Design Flaws
 each request message sent by a STA
must be responded with a response
message sent by the AP.
 Probe Request/Response frames are
unprotected.
Test Bed
BSS
Test1-PC (User)
Windows XP
Intel(R) PRO/Wireless LAN 2100 3B Mini
PCI Adapter
MAC: Intel_5b:dd:b3
Test3-PC (Attacker)
BackTrack4 (Linux)
MAC: Intel_a5:23:37
Test-AP (Access Point)
MAC: Netgrar_42:cf:c0
Test2-PC (User)
Windows Vista
Intel® PRO/Wireless 2200BG
Wireless Connection
MAC: Intel_39:c9:33
Sniffing & Injecting work !
Existing Countermeasures
 Cryptography
 Encryption
 long-term secret key
 Client Puzzle
 MAC Frame Fields
 Analysis of Sequence Number field.
 Change Re-try limit
 Response Delay
 NIC Profiling & Signal Finger Printing
 AI Models
The future research
 Keep a “Safe List” of known attributes and
give priority to “Safe List”.
 Pattern Recognition of “Transactions” and
filter peculiar Probe Requests.
Summary
 What is IEEE 802.11?
 What is Probe Request & Response ?
 What is a Probe Request Flooding Attack ?
 So what happens?
 Aim
 Design Flaws
 Experiment
 Existing Countermeasures
 Future Research
References
 Bicakci, K. and Tavli, B. (2009) Denial-of-Service attacks and countermeasures in IEEE
802.11 wireless networks, Computer Standards and Interfaces 31(5), pp931-941, [Online]
Available at http://www.sciencedirect.com [Accessed: 3rd October 2009].
 Faria, D.B. and Cheriton, D.R. (2006) Detecting identity-based attacks in wireless networks
using signal prints, Proceedings of the 5th ACM workshop on Wireless security, Los Angeles,
California [Online] Available at http://0-delivery.acm.org [Accessed: 30 November 2009].
 Liu, C. and Yu, J. (2008) Rogue access point based DoS attacks against 802.11 WLANs,
Fourth Advanced International Conference on Telecommunications, AICT '08., 8(13),
pp271-276, [Online] Available at: http://0-ieeexplore.ieee.org [Accessed: 10 October
2008].
 Malekzadeh, M. et al. (2007) Security improvement for management frames in IEEE 802.11
wireless networks, International Journal of Computer Science and Network Security, IJCSNS
7(6) [Online] Available at: http://citeseerx.ist.psu.edu [Accessed: 2 February 2010].
 Martinovic, I. et al. (2008) Wireless client puzzles in IEEE 802.11 networks: security by
wireless. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec
'08, New York [Online] Available at: http://0-doi.acm.org [Accessed: 31 March 2010].
Thank You
Deepthi Ratnayake
(gdd0014@londonmet.ac.uk)
LMU PG Student Conference
12th Nov 2010

More Related Content

Similar to Deepthi ratnayake

Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
IJCSIS Research Publications
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
CSCJournals
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
donnajames55
 
Speaking Engagements and Publications
Speaking Engagements and PublicationsSpeaking Engagements and Publications
Speaking Engagements and Publications
rick mellendick
 

Similar to Deepthi ratnayake (20)

Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
lecture_5.pptx
lecture_5.pptxlecture_5.pptx
lecture_5.pptx
 
Deepthi ratnayake
Deepthi ratnayakeDeepthi ratnayake
Deepthi ratnayake
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
Throughput Analysis of IEEE WLAN "802.11 ac" Under WEP, WPA, and WPA2 Securit...
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
SECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAXSECURITY ALGORITHMS FOR WIMAX
SECURITY ALGORITHMS FOR WIMAX
 
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docxComposition Assistance - Topic Gun ControlAssignment 2 Your R.docx
Composition Assistance - Topic Gun ControlAssignment 2 Your R.docx
 
A Survey On Wireless security
A Survey On Wireless securityA Survey On Wireless security
A Survey On Wireless security
 
October 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsOctober 2021: Top 10 Read Articles in Network Security and Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
 
Speaking Engagements and Publications
Speaking Engagements and PublicationsSpeaking Engagements and Publications
Speaking Engagements and Publications
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
The Secret Recipe for Automating Android Malware Analysis - Lorenzo Cavallaro...
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Wireless networks syllabus
Wireless networks syllabusWireless networks syllabus
Wireless networks syllabus
 

More from LondonMet PGR Students (20)

Sara cannizzaro
Sara cannizzaroSara cannizzaro
Sara cannizzaro
 
Inflation targeting misfiring on development of housing market bubble
Inflation targeting misfiring on development of housing market bubbleInflation targeting misfiring on development of housing market bubble
Inflation targeting misfiring on development of housing market bubble
 
Md kanu
Md kanuMd kanu
Md kanu
 
Jabeen shah
Jabeen shahJabeen shah
Jabeen shah
 
Glyn robbins
Glyn robbinsGlyn robbins
Glyn robbins
 
Robert gonouya
Robert gonouyaRobert gonouya
Robert gonouya
 
Janet bowstead poster
Janet bowstead posterJanet bowstead poster
Janet bowstead poster
 
Veronica azolukwam
Veronica azolukwamVeronica azolukwam
Veronica azolukwam
 
Veronica azolukwam
Veronica azolukwamVeronica azolukwam
Veronica azolukwam
 
Marta kaleta
Marta kaletaMarta kaleta
Marta kaleta
 
Tracy part
Tracy partTracy part
Tracy part
 
Shazaib butt
Shazaib buttShazaib butt
Shazaib butt
 
Ozlem edizel
Ozlem edizelOzlem edizel
Ozlem edizel
 
Thao nguyen
Thao nguyenThao nguyen
Thao nguyen
 
Qicheng yu
Qicheng yuQicheng yu
Qicheng yu
 
Mohammad khaleq newaz
Mohammad khaleq newazMohammad khaleq newaz
Mohammad khaleq newaz
 
Joycelyn adinkrah
Joycelyn adinkrahJoycelyn adinkrah
Joycelyn adinkrah
 
Janet bowstead
Janet bowsteadJanet bowstead
Janet bowstead
 
Syahnaz mohdmokhter
Syahnaz mohdmokhterSyahnaz mohdmokhter
Syahnaz mohdmokhter
 
Mokhter syahnaz
Mokhter syahnazMokhter syahnaz
Mokhter syahnaz
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Deepthi ratnayake

  • 1. An improved authentication model for IEEE 802.11 to prevent Probe Request DoS Attacks. Deepthi Ratnayake (gdd0014@londonmet.ac.uk) LMU PG Student Conference 12th Nov 2010
  • 2. Topics  Introduction  Aim  Design Flaws  Experiment  Test Bed  Results  Existing Countermeasures  Future Research
  • 3. Introduction  What is IEEE 802.11?  What is Probe Request & Response ? Security Policy Agreement Supplicant (STA) Unauthenticated, Unassociated, 8021.1X Blocked Authenticator (AP) Unauthenticated, Unassociated, 8021.1X Blocked 1 - Beacon 1 - Probe Request 2 - Probe Response 3 - Authentication Request 4 - Authentication Response 6 - Association Response 5 - Association Request Authenticated, Associated, 8021.1X Blocked, Security Parameters Authenticated, Associated, 8021.1X Blocked, Security Parameters Authentication Phase of IEEE 802.11
  • 4. Introduction  What is a PRF Attack ?  designed to manipulate 802.11 design flaws  Sends a flood of PR frames using MAC spoofing to represent a large number of nodes scanning the wireless network  So what happens?  Serious performance degradation or prevent legitimate users from accessing network resources (DoS). DoS attacks are the most common
  • 5. Aim To find an effective method to:  recognise rogue Probe Request frames,  and prevent an AP from triggering a Probe Response. Length - Bytes 2 2 6 6 6 2 6 Variable Variable 4 Field Frame Control Duration ID DA SA BSSID Sequence Control SSID Supported Rates Estended Supported Rates FCS MAC HEADER FRAME BODY CRC Length - Bits 2 2 4 1 1 1 1 1 1 1 1 Field Protocol Version Type Sub Type To DS From DS More Frag Retry Power Management More Data WEP Reserved FRAME CONTROL
  • 6. Design Flaws  each request message sent by a STA must be responded with a response message sent by the AP.  Probe Request/Response frames are unprotected.
  • 7. Test Bed BSS Test1-PC (User) Windows XP Intel(R) PRO/Wireless LAN 2100 3B Mini PCI Adapter MAC: Intel_5b:dd:b3 Test3-PC (Attacker) BackTrack4 (Linux) MAC: Intel_a5:23:37 Test-AP (Access Point) MAC: Netgrar_42:cf:c0 Test2-PC (User) Windows Vista Intel® PRO/Wireless 2200BG Wireless Connection MAC: Intel_39:c9:33
  • 9. Existing Countermeasures  Cryptography  Encryption  long-term secret key  Client Puzzle  MAC Frame Fields  Analysis of Sequence Number field.  Change Re-try limit  Response Delay  NIC Profiling & Signal Finger Printing  AI Models
  • 10. The future research  Keep a “Safe List” of known attributes and give priority to “Safe List”.  Pattern Recognition of “Transactions” and filter peculiar Probe Requests.
  • 11. Summary  What is IEEE 802.11?  What is Probe Request & Response ?  What is a Probe Request Flooding Attack ?  So what happens?  Aim  Design Flaws  Experiment  Existing Countermeasures  Future Research
  • 12. References  Bicakci, K. and Tavli, B. (2009) Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks, Computer Standards and Interfaces 31(5), pp931-941, [Online] Available at http://www.sciencedirect.com [Accessed: 3rd October 2009].  Faria, D.B. and Cheriton, D.R. (2006) Detecting identity-based attacks in wireless networks using signal prints, Proceedings of the 5th ACM workshop on Wireless security, Los Angeles, California [Online] Available at http://0-delivery.acm.org [Accessed: 30 November 2009].  Liu, C. and Yu, J. (2008) Rogue access point based DoS attacks against 802.11 WLANs, Fourth Advanced International Conference on Telecommunications, AICT '08., 8(13), pp271-276, [Online] Available at: http://0-ieeexplore.ieee.org [Accessed: 10 October 2008].  Malekzadeh, M. et al. (2007) Security improvement for management frames in IEEE 802.11 wireless networks, International Journal of Computer Science and Network Security, IJCSNS 7(6) [Online] Available at: http://citeseerx.ist.psu.edu [Accessed: 2 February 2010].  Martinovic, I. et al. (2008) Wireless client puzzles in IEEE 802.11 networks: security by wireless. In Proceedings of the First ACM Conference on Wireless Network Security, WiSec '08, New York [Online] Available at: http://0-doi.acm.org [Accessed: 31 March 2010].
  • 13. Thank You Deepthi Ratnayake (gdd0014@londonmet.ac.uk) LMU PG Student Conference 12th Nov 2010