尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
IDS IN WIRELESS NETWORKS




           Mr. Deepak D. Kshirsagar
                 Research Scholar,
   Department of Computer Science & Engineering,
      Indian Institute of Technology Roorkee.
                                                        1
                                                   IIT Roorkee
Introduction
•   Wi-Fi is a trademark of the Wi-Fi Alliance for certified
    products based on the IEEE 802.11 standards (also called
    WLAN and Wi-Fi).

•   This certification warrants interoperability between different
    wireless devices.

•   But not every wireless Internet product has a Wi-Fi
    certification, which may be because of certification costs
    that must be paid for each certified device type.

•   Wi-Fi is supported by most personal computer operating
    systems, many game consoles, laptops, smart phones,
    printers, and other peripherals.



                                                                2
Operational Advantage
•   Typically reducing the costs of network deployment and
    expansion. Spaces where cables cannot be run, such as
    outdoor areas and historical buildings, can host wireless
    LANs.

•   Wireless network adapters are now built into most laptops.

•   Wi-Fi has become widespread in corporate infrastructures.

•   Different competitive brands of access points and client
    network interfaces are inter-operable at a basic level of
    service.

•   Wi-Fi is a global set of standards. Unlike mobile telephones,
    any standard Wi-Fi device will work anywhere in the world.


                                                                3
Operational Advantage
•   Wi-Fi is widely available in more than 220,000 public
    hotspots and tens of millions of homes and corporate and
    university campuses worldwide.

•   Wi-Fi Protected Access encryption (WPA and WPA2) is not
    easily cracked if strong passwords are used.

•   New protocols for Quality of Service (WMM) make Wi-Fi
    more suitable for latency-sensitive applications (such as
    voice and video), and power saving mechanisms (WMM
    Power Save) improve battery operation.




                                                           4
Threats to Security
•   The most common wireless encryption standard, Wired
    Equivalent Privacy (WEP) has been shown to be easily
    breakable even when correctly configured.

•   Wi-Fi Access Points typically    default   to   an   "open"
    (encryption-free) mode.

•   But this default is without any wireless security enabled,
    providing open wireless access to their LAN.

•   Wi-Fi networks that are open (unencrypted) can be
    monitored and used to read and copy data (including
    personal information) transmitted over the network.

•   Another security method is used to secure the data, such
    as a VPN or a secure web page. (HTTPS/Secure Socket
    Layer.)
                                                           5
Wireless AP Vs Ad-hoc Network
•   An Ad-hoc network uses a connection between two or more
    devices without using an access point: the devices
    communicate directly.

•   Used in situations, such as for a quick data exchange, or
    for a Multiplayer LAN game, because it is easy to set up
    and does not require an access point.

•   Due to its peer-to-peer layout, Ad-hoc connections are
    similar to Bluetooth ones, and are generally not
    recommended for a permanent installation.

•   Internet access via Ad-hoc networks, using features like
    Windows Internet Connection Sharing, may work well with
    a small number of devices that are close to each other, but
    Ad-hoc networks don't scale well.
                                                              6
Wireless Access Point Vs Ad-hoc N/W
•   Internet traffic will converge to the nodes with direct
    internet connection, potentially congesting these nodes.

•   For internet-enabled nodes, Access Points have a clear
    advantage, being designed to handle this load.




                                                          7
Rogue Access Points
•   These are unauthorized access point which provides us
    connectivity with the internet and save our conversations.

•   Through which important information can be retrieved like
    credit card number used in online shopping or bank account
    number and password.

•   Here our Wi-Fi card can connect to an access point whose
    SSId is “badguy” which is rogue access point as per our
    knowledge and we should stop it from connecting.

•   Our Research shows that, We report central server about
    rogue access point and locate its position with respect to
    our central server


                                                            8
Rogue access points




                      9
Wireless Handshake Protocol : Connection Protocol

•   Scanning
      Active Scanning
       STA sends out Probe request, AP replies with Probe
       response.
      Passive Scanning
       STA listens to Beacon

•   Authentication
      Open
       STA sends out Authentication frame, and AP replied with
       Authentication frame.




                                                           10
Wireless Handshake Protocol : Connection Protocol

   Shared-key
    Based on WEP and requires that both stations
    implement WEP; STA sends out Authentication frame,
    and AP replied with Authentication frame with challenge
    text (clear), then STA replies with Authentication frame
    with encrypted challenge text.

    Upon receiving this, AP decrypts the challenge text, if
    the frame decrypts to the Challenge Text, the access
    point will respond with Authentication frame with a
    status code of successful.

   802.1X - Used in WPA



                                                         11
Wireless Handshake Protocol : Connection Protocol

•   Association
•   Association is restricted to infrastructure mode and is
    logically equivalent to plugging into a wired network.

•   Binding them altogether, the handshaking between STA
    and AP for an open-system authentication wireless LAN
    network




                                                        12
Network Detection System
•   We have implemented the research with
     To get information about our wireless network
     Data transfer between Server and Clients.

•   We can divide this implementation into three sections

    1. Detecting unauthorized access point (intruder).
    2. Sending information to the central server.
    3. Calculation of exact location of intruder at the central
       server.




                                                            13
Query to retrieve SSIds
•   we have     used   Windows Management Instrumentation
    (WMI).

•   Detected all the wireless networks in range.

•   It will return the SSIds of all the Access Points in range.

•   It will also return the signal strength received.

•   We store all this information into a file using file handling.




                                                                  14
Query to retrieve SSIds
•   The query we use here to retrieve SSIds is
        "SELECT * FROM MSNDis_80211_BSSIList"

    Here MSNDis_80211_BSSIList is the name of table where
    the list of SSIds in range is stored.

    This table is present in windows XP by default.

•   The query we use here to retrieve Signal Strength is
    “SELECT * FROM MSNdis_80211_ReceivedSignalStrength”

    Here MSNdis_80211_ReceivedSignalStrength is the name
    of table where the list of Signal Strength is stored.

    This table is present in windows XP by default.


                                                       15
Find networks that are common to all three clients

•   First created a wireless ad-hoc network with four laptops.

    Among them three are considered as clients and one is
    considered as server.

•   We run client program on our 3 clients and server program
    on 1 laptop.

    In client program we provide computer name of server
    laptop.

    Clients will connect to server one by one.

    After connecting they will send their respective files
    containing the network information.


                                                                 16
Figure : Client sending data to the central server.

                                                      17
•   Now the server will have all three text files with it.

•   It will parse all files and find networks that are common to
    all three clients.

•   Calculate actual distance of all clients from the access point
    using the signal strengths.

•   Move on to the geometry part.




                                                               18
Figure : Server receiving information from CLIENT1

                                                19
•   On server we will have a list of authorized access points.

•   If detected networks are not in that list then they will be
    considered as unauthorized access points.

•   And all further calculations are done for unauthorized
    access points.




                                                                 20
Figure : Server Side Showing Network Information

                                                   21
Figure : Showing location of unauthorized network


                                                    22
Geometry
•   Moving on to the geometry part we consider our server as
    origin (point (0, 0)) of co-ordinate geometry.

•   Now with respect to it we have to find out location of the
    unauthorized access points

•   Now, what we have is co-ordinates of our three laptops and
    their distance from access point.

    we draw 3 imaginary circles with origin as the co-ordinates
    of clients and radius as their distance from access points.

    These 3 circles will meet at a single point which will be the
    location of access point that we want.

•   The situation something like this

                                                              23
Figure : Access Point in Range of Three Clients

                                                  24
Geometry
•   Here one thing is sure that access point will be on the
    circumference of all three circles and three circles meet at a
    single point.

    That point will be the co-ordinates of location of access
    point.

•   We will solve the situation by solving equations of three
    circles.
    For example equation of circle with radius ‘r’ and centre
    (a, b) is (x-a)2 + (y-b)2=r2

•   Like this we will have three equations of three circles and
    by solving them we will get a single point which is location
    of the access point.
                                                               25
Figure : Location of Access Point
                                    26
Geometry
•   Here from figure, D=(x2+y2)1/2

•   To find out the location of access point.

    we assign co-ordinates to each client taking server as
    origin.

    In figure server is at (0,0), client1 is at (-4,10), client2 is at
    (-10,-2), client3 is at (-2,4).

    We take these points as an input from user.




                                                                   27
Geometry
•   Now we also have distance of each client from the
    unauthorized access point detected which we have
    calculated from the signal strength at each client.

•   So we draw three virtual circles with origin at three clients
    and radius as their distance from the access point.

•   Now we have equations of three circles as:-
              For CLIENT1 (x+4)2 + (y-10)2= D12
               For CLIENT2 (x+10)2 + (y+2)2= D22
               For CLIENT3 (x+2)2 + (y-4)2= D32




                                                              28
Geometry
•   We have values of D1,D2,D3 from our program.

•   Therefore we can solve these equations for (x,y) which is
    the location of our unauthorized access point.

•   From the value of x and y we can decide access point
    reside in which quadrant.




                                                          29
Conclusions
•   In a wireless network an important thing is to check
    whether our communication is secure or not.

•   Generally in public places we find wireless networks around
    us which provide us connectivity.

    But if the network (Access point) is not authorized then it
    can trace all the communication done through it and we
    can lose our confidential data.

    Like online money transaction done by us can be traced
    and our credit card information can be revealed.

•   For this reason we must confirm that the network we are
    using is authorized one.


                                                            30
Conclusions
•   Our research finds out the SSId of all the networks in
    range. Then it compares it with the list of authorized APs.
    Using our three clients, find out the location of all
    unauthorized access points in range of our clients.

•   The system will be useful to detect an unauthorized
    wireless access point present in wireless LAN.

•   An access point is like a server through which all computers
    present in wireless LAN are connected to the internet. It
    acts like a router.

•   The primary purpose of Wireless IDS is to prevent
    unauthorized network access to local area networks and
    other information assets by wireless devices.


                                                             31
References
1.    C. Karlof, D. Wagner, “Secure routing in sensor networks: attacks
     and countermeasures” IEEE Workshop on Sensor Network Protocols
     and Applications, May 2003.
2.    Anthony D. Wood , John A. Stankovic, “Denial of Service in Sensor
     Networks,“ October 2002.
3.     Benjamin J. Culpepper , H. Chris Tseng, Sinkhole “Intrusion
     Indicators in DSR MANETs,” First International Conference on
     Broadband Networks, October 2004.
4.   Deng, H., Li, W. and Agrawal, D.P , “Routing security in wireless ad
     hoc networks”, IEEE Communications Magazine.
5.    Deng, J., Han, R. and Mishra, S., “INSENS: intrusion-tolerant
     routing for wireless sensor networks” Elsevier Computer
     Communications.
6.   D.E. Denning, “An intrusion detection model,” IEEE Symposium on
     Security and Privacy,.

                                                                      32

More Related Content

What's hot

Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
RhysDeirdreDahilig
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
Pavan Kumar Sindgi
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
IJCNCJournal
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
Shakib Ansaar
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
guestbeb9a5
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
Aurobindo Nayak
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
safi Ullah
 
Ip addressing
Ip addressingIp addressing
Ip addressing
Mansour Naslcheraghi
 
Tushar mobile i-pv6
Tushar mobile i-pv6Tushar mobile i-pv6
Tushar mobile i-pv6
naruto35
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
Abu Rayhan Ahmmed Rimu
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
Johnson Ubah
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
Ram Dutt Shukla
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
faisalmalik
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
kishorekommu kommu
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
zan
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
Mohammad Adil
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Eric Vanderburg
 

What's hot (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
 
ip versions.pdf
ip versions.pdfip versions.pdf
ip versions.pdf
 
Mobile IP - pavankumar_912
Mobile IP - pavankumar_912Mobile IP - pavankumar_912
Mobile IP - pavankumar_912
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Introduction to Mobile IPv6
Introduction to Mobile IPv6Introduction to Mobile IPv6
Introduction to Mobile IPv6
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Ip addressing comp
Ip addressing compIp addressing comp
Ip addressing comp
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Tushar mobile i-pv6
Tushar mobile i-pv6Tushar mobile i-pv6
Tushar mobile i-pv6
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Wireless LAN Security
Wireless LAN SecurityWireless LAN Security
Wireless LAN Security
 
IP Addressing
IP AddressingIP Addressing
IP Addressing
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Vpn Virtual Private Network
Vpn  Virtual Private NetworkVpn  Virtual Private Network
Vpn Virtual Private Network
 
PPT Backbone And Networks
PPT Backbone And NetworksPPT Backbone And Networks
PPT Backbone And Networks
 
77232345 cours-ip-mobile
77232345 cours-ip-mobile77232345 cours-ip-mobile
77232345 cours-ip-mobile
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 

Similar to Ids in wn

Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
kratos2424
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
MD MONIRUZZAMAN
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
inventy
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Đồng Quốc Vương
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
ifrieshe
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
Dân Chơi
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
JigsAshley
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
AmitDeshai
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptx
ReyEvangelista2
 
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
Wifi cannerdddddddddddddddddddddddddddddddddddddddddddddWifi cannerddddddddddddddddddddddddddddddddddddddddddddd
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
rodainaelhady1
 
Wireless router
Wireless routerWireless router
Wireless router
roza921
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
tardeep
 
Gateway
GatewayGateway
Gateway
debugsom
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
Moin Islam
 
Wifi
WifiWifi
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
Sanghyeok Park
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
HemanthGowdaN1
 

Similar to Ids in wn (20)

Ch7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wirelessCh7 ccna exploration 3 lan switching and wireless
Ch7 ccna exploration 3 lan switching and wireless
 
Wifi- technology_moni
Wifi- technology_moniWifi- technology_moni
Wifi- technology_moni
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answersCcnav5.org ccna 3-chapter_4_v50_2014_exam_answers
Ccnav5.org ccna 3-chapter_4_v50_2014_exam_answers
 
Bcc comp4 ppt2
Bcc comp4 ppt2Bcc comp4 ppt2
Bcc comp4 ppt2
 
Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011Ccna 3 chapter 7 v4.0 answers 2011
Ccna 3 chapter 7 v4.0 answers 2011
 
Recent Trends in Wireless communication
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communication
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
homenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptxhomenetowrkingTechnology Livelihood Education10.pptx
homenetowrkingTechnology Livelihood Education10.pptx
 
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
Wifi cannerdddddddddddddddddddddddddddddddddddddddddddddWifi cannerddddddddddddddddddddddddddddddddddddddddddddd
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
 
Wireless router
Wireless routerWireless router
Wireless router
 
wi-fi technology
wi-fi technologywi-fi technology
wi-fi technology
 
Gateway
GatewayGateway
Gateway
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Wifi
WifiWifi
Wifi
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
wi-fi.pptx
wi-fi.pptxwi-fi.pptx
wi-fi.pptx
 

Ids in wn

  • 1. IDS IN WIRELESS NETWORKS Mr. Deepak D. Kshirsagar Research Scholar, Department of Computer Science & Engineering, Indian Institute of Technology Roorkee. 1 IIT Roorkee
  • 2. Introduction • Wi-Fi is a trademark of the Wi-Fi Alliance for certified products based on the IEEE 802.11 standards (also called WLAN and Wi-Fi). • This certification warrants interoperability between different wireless devices. • But not every wireless Internet product has a Wi-Fi certification, which may be because of certification costs that must be paid for each certified device type. • Wi-Fi is supported by most personal computer operating systems, many game consoles, laptops, smart phones, printers, and other peripherals. 2
  • 3. Operational Advantage • Typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs. • Wireless network adapters are now built into most laptops. • Wi-Fi has become widespread in corporate infrastructures. • Different competitive brands of access points and client network interfaces are inter-operable at a basic level of service. • Wi-Fi is a global set of standards. Unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world. 3
  • 4. Operational Advantage • Wi-Fi is widely available in more than 220,000 public hotspots and tens of millions of homes and corporate and university campuses worldwide. • Wi-Fi Protected Access encryption (WPA and WPA2) is not easily cracked if strong passwords are used. • New protocols for Quality of Service (WMM) make Wi-Fi more suitable for latency-sensitive applications (such as voice and video), and power saving mechanisms (WMM Power Save) improve battery operation. 4
  • 5. Threats to Security • The most common wireless encryption standard, Wired Equivalent Privacy (WEP) has been shown to be easily breakable even when correctly configured. • Wi-Fi Access Points typically default to an "open" (encryption-free) mode. • But this default is without any wireless security enabled, providing open wireless access to their LAN. • Wi-Fi networks that are open (unencrypted) can be monitored and used to read and copy data (including personal information) transmitted over the network. • Another security method is used to secure the data, such as a VPN or a secure web page. (HTTPS/Secure Socket Layer.) 5
  • 6. Wireless AP Vs Ad-hoc Network • An Ad-hoc network uses a connection between two or more devices without using an access point: the devices communicate directly. • Used in situations, such as for a quick data exchange, or for a Multiplayer LAN game, because it is easy to set up and does not require an access point. • Due to its peer-to-peer layout, Ad-hoc connections are similar to Bluetooth ones, and are generally not recommended for a permanent installation. • Internet access via Ad-hoc networks, using features like Windows Internet Connection Sharing, may work well with a small number of devices that are close to each other, but Ad-hoc networks don't scale well. 6
  • 7. Wireless Access Point Vs Ad-hoc N/W • Internet traffic will converge to the nodes with direct internet connection, potentially congesting these nodes. • For internet-enabled nodes, Access Points have a clear advantage, being designed to handle this load. 7
  • 8. Rogue Access Points • These are unauthorized access point which provides us connectivity with the internet and save our conversations. • Through which important information can be retrieved like credit card number used in online shopping or bank account number and password. • Here our Wi-Fi card can connect to an access point whose SSId is “badguy” which is rogue access point as per our knowledge and we should stop it from connecting. • Our Research shows that, We report central server about rogue access point and locate its position with respect to our central server 8
  • 10. Wireless Handshake Protocol : Connection Protocol • Scanning  Active Scanning STA sends out Probe request, AP replies with Probe response.  Passive Scanning STA listens to Beacon • Authentication  Open STA sends out Authentication frame, and AP replied with Authentication frame. 10
  • 11. Wireless Handshake Protocol : Connection Protocol  Shared-key Based on WEP and requires that both stations implement WEP; STA sends out Authentication frame, and AP replied with Authentication frame with challenge text (clear), then STA replies with Authentication frame with encrypted challenge text. Upon receiving this, AP decrypts the challenge text, if the frame decrypts to the Challenge Text, the access point will respond with Authentication frame with a status code of successful.  802.1X - Used in WPA 11
  • 12. Wireless Handshake Protocol : Connection Protocol • Association • Association is restricted to infrastructure mode and is logically equivalent to plugging into a wired network. • Binding them altogether, the handshaking between STA and AP for an open-system authentication wireless LAN network 12
  • 13. Network Detection System • We have implemented the research with  To get information about our wireless network  Data transfer between Server and Clients. • We can divide this implementation into three sections 1. Detecting unauthorized access point (intruder). 2. Sending information to the central server. 3. Calculation of exact location of intruder at the central server. 13
  • 14. Query to retrieve SSIds • we have used Windows Management Instrumentation (WMI). • Detected all the wireless networks in range. • It will return the SSIds of all the Access Points in range. • It will also return the signal strength received. • We store all this information into a file using file handling. 14
  • 15. Query to retrieve SSIds • The query we use here to retrieve SSIds is "SELECT * FROM MSNDis_80211_BSSIList" Here MSNDis_80211_BSSIList is the name of table where the list of SSIds in range is stored. This table is present in windows XP by default. • The query we use here to retrieve Signal Strength is “SELECT * FROM MSNdis_80211_ReceivedSignalStrength” Here MSNdis_80211_ReceivedSignalStrength is the name of table where the list of Signal Strength is stored. This table is present in windows XP by default. 15
  • 16. Find networks that are common to all three clients • First created a wireless ad-hoc network with four laptops. Among them three are considered as clients and one is considered as server. • We run client program on our 3 clients and server program on 1 laptop. In client program we provide computer name of server laptop. Clients will connect to server one by one. After connecting they will send their respective files containing the network information. 16
  • 17. Figure : Client sending data to the central server. 17
  • 18. Now the server will have all three text files with it. • It will parse all files and find networks that are common to all three clients. • Calculate actual distance of all clients from the access point using the signal strengths. • Move on to the geometry part. 18
  • 19. Figure : Server receiving information from CLIENT1 19
  • 20. On server we will have a list of authorized access points. • If detected networks are not in that list then they will be considered as unauthorized access points. • And all further calculations are done for unauthorized access points. 20
  • 21. Figure : Server Side Showing Network Information 21
  • 22. Figure : Showing location of unauthorized network 22
  • 23. Geometry • Moving on to the geometry part we consider our server as origin (point (0, 0)) of co-ordinate geometry. • Now with respect to it we have to find out location of the unauthorized access points • Now, what we have is co-ordinates of our three laptops and their distance from access point. we draw 3 imaginary circles with origin as the co-ordinates of clients and radius as their distance from access points. These 3 circles will meet at a single point which will be the location of access point that we want. • The situation something like this 23
  • 24. Figure : Access Point in Range of Three Clients 24
  • 25. Geometry • Here one thing is sure that access point will be on the circumference of all three circles and three circles meet at a single point. That point will be the co-ordinates of location of access point. • We will solve the situation by solving equations of three circles. For example equation of circle with radius ‘r’ and centre (a, b) is (x-a)2 + (y-b)2=r2 • Like this we will have three equations of three circles and by solving them we will get a single point which is location of the access point. 25
  • 26. Figure : Location of Access Point 26
  • 27. Geometry • Here from figure, D=(x2+y2)1/2 • To find out the location of access point. we assign co-ordinates to each client taking server as origin. In figure server is at (0,0), client1 is at (-4,10), client2 is at (-10,-2), client3 is at (-2,4). We take these points as an input from user. 27
  • 28. Geometry • Now we also have distance of each client from the unauthorized access point detected which we have calculated from the signal strength at each client. • So we draw three virtual circles with origin at three clients and radius as their distance from the access point. • Now we have equations of three circles as:- For CLIENT1 (x+4)2 + (y-10)2= D12 For CLIENT2 (x+10)2 + (y+2)2= D22 For CLIENT3 (x+2)2 + (y-4)2= D32 28
  • 29. Geometry • We have values of D1,D2,D3 from our program. • Therefore we can solve these equations for (x,y) which is the location of our unauthorized access point. • From the value of x and y we can decide access point reside in which quadrant. 29
  • 30. Conclusions • In a wireless network an important thing is to check whether our communication is secure or not. • Generally in public places we find wireless networks around us which provide us connectivity. But if the network (Access point) is not authorized then it can trace all the communication done through it and we can lose our confidential data. Like online money transaction done by us can be traced and our credit card information can be revealed. • For this reason we must confirm that the network we are using is authorized one. 30
  • 31. Conclusions • Our research finds out the SSId of all the networks in range. Then it compares it with the list of authorized APs. Using our three clients, find out the location of all unauthorized access points in range of our clients. • The system will be useful to detect an unauthorized wireless access point present in wireless LAN. • An access point is like a server through which all computers present in wireless LAN are connected to the internet. It acts like a router. • The primary purpose of Wireless IDS is to prevent unauthorized network access to local area networks and other information assets by wireless devices. 31
  • 32. References 1. C. Karlof, D. Wagner, “Secure routing in sensor networks: attacks and countermeasures” IEEE Workshop on Sensor Network Protocols and Applications, May 2003. 2. Anthony D. Wood , John A. Stankovic, “Denial of Service in Sensor Networks,“ October 2002. 3. Benjamin J. Culpepper , H. Chris Tseng, Sinkhole “Intrusion Indicators in DSR MANETs,” First International Conference on Broadband Networks, October 2004. 4. Deng, H., Li, W. and Agrawal, D.P , “Routing security in wireless ad hoc networks”, IEEE Communications Magazine. 5. Deng, J., Han, R. and Mishra, S., “INSENS: intrusion-tolerant routing for wireless sensor networks” Elsevier Computer Communications. 6. D.E. Denning, “An intrusion detection model,” IEEE Symposium on Security and Privacy,. 32
  翻译: