430 likes | 435 Views
Learn about cutting-edge WLAN security techniques by BITHGROUP Technologies. Secure your wireless networks with expert insights and strategies.
E N D
Best Practices in WLAN Security presented by:Wayne Armour, CISSP CTO, BITHGROUP Technologies
BITHGROUP Who We Are • Founded in 1992 • Headquarters in Columbia, MD – Offices in: • Baltimore, MD • Philadelphia, PA • Huntsville, AL • Atlanta, GA • MBE Certification • Maryland • Georgia (pending) • Pennsylvania (pending) • PANYNJ • National Minority Supplier Development Council (NMSDC) • MDOT Certification (SDB)
Executive Management • Robert L. Wallace(President and CEO) • 27 years experience in management, engineering, systems development, & application development • DuPont, Procter & Gamble, IBM, ECS Technologies • B.S. Mechanical Engineering & Applied Mechanics, University of Pennsylvania, Towne School of Engineering • M.B.A. Amos Tuck School of Business at Dartmouth College • Doctorate of Humane Letters, Sojourner-Douglass College • Author of 5 Best Selling Books
Executive Management • Wayne W. Armour, CISSP (Chief Technology Officer) • 26 Years experience, computer engineering, software development, information security, wireless engineering, and wireless security • IBM, AT&T Bell Labs Research, OFO Technologies, Inc. • B.S. Electrical Engineering (Computer Science Minor) University of Pennsylvania, Moore School of Electrical Engineering
Executive Management • Jerome Sanders(Chief Financial Officer) • 27 years experience, engineering, consulting, manufacturing, finance, investment banking • DuPont, Cresap & McCormick, Carrier, SDGG Holding Company, The Broadview Group, Inc. • B.S. Mechanical Engineering, University of Akron • M.B.A. Wharton School of Business, University of Pennsylvania
Executive Management • Carolyn W. Green(Chief Administration Officer) • 26 years experience, engineering, research & development, operations management, high performance team development, human resources management • DuPont, General Motors, Procter & Gamble • B.S. Mechanical/Biomedical Engineering, University of Delaware
BITHGROUP Technologies • Core Services include: • Management Consulting • Information Security • Network Engineering & Security • Wireless Engineering & Security • Secure Wireless Immersion Methodology (S.W.I.M.) • Compliance • CityWise • Systems Design & Development • Information Technology Consulting • Software Development
CoB MOIT Defense Information Systems Agency National Nuclear Security Administration U.S. Department of Agriculture NAVAIR The Pentagon Customers Pace University University of Maryland SIAC State of MD – MVA State of MD – MTA DoE (Oak Ridge)
Background • IBM/IBM Research • Prodigy • SNA 3rd level support • Bell Labs/BL Research • GSM • MM Research (VMR) • Video Technology (Hobby) • Too Late for Goya – F. Torres (Guggenheim) • Repository of Absent Flesh – F. Torres (List) • X10/PIr => “A Lot of Wires!!”
Secure Wireless Architecture Design • WPA2 • Perimeter Protection • Wireless Backhaul • WIDS/IPS • Asset Management • SOX • STM
Secure Wireless Immersion Methodology S.W.I.M. • Secure Wireless Arch. Design/Implementation • Wireless Intrusion Detection/Protection • Wireless Mesh Networks • Wireless Perimeter Protection • Wireless Asset Management (RFID) • Federated Wireless Security Policy (FedWiSP) • Secure Wireless VoIP (VoFi) • Wireless Security Training
Educational WLAN Requirements • Ubiquitous Access • Students • Faculty • Guests and Visitors • Mobility
Educational WLAN Requirements • Campus Security • Students • Faculty • Visitors
Educational WLAN Requirements • Location-based Services • Collaboration • Voice, Video, Data • IM with Location Component • VoFi • Access Policies • Access to real-time Dept. Portal info while in class • “Instant” augmentation to Campus-WLAN • Events
Educational WLAN Requirements • Remote Access • Campus WLAN that travels with you • One profile for traveling executives and remote workers • On-site registration during school visit (Admissions Office)
Educational WLAN Requirements • Converged Mobile Media • Voice, video, data while mobile • Campus police responding to incident • WLAN/VoFi access while on University Transportation
Security as an Enabling Technology • Granular Security Policies • Mapping of Internal Resources • Separate Networks Logically • Faculty, Student, Guest Policies • Visitors (http/pop3/dns) • Faculty/Students get access wrt internal network mapping • Multiple Auth/Az Schemes • 802.1X (EAP) • Captive Portal
Central Security Services (Wired/Wireless) Anti-virus WLAN Switch Remediation Content filtering IDS WLAN and WiredDeployment
Mesh - Security & Surveillance • Instant Mesh Network • Portable Wireless Infrastructure • Extends Network Reach • PoE Security Cameras
Wireless Mesh Networks • “Instant” Wireless Networks • Access to back-end databases • Self Configuring • Self Healing • AES Encryption between nodes • “First Responder Mobility”
Security as an Enabling Technology • 802.1X Extensible Authentication Protocol (EAP) • Protocol • Addition of Location to Auth Scheme
EAP Conversation • Phase 0: Discovery • Phase 1: Authentication • Phase 1a: EAP Authentication • Phase 1b: AAA-Key Transport • Phase 2: Secure Association Establishment • Unicast Secure Association • Multicast Secure Association
Location-based Security (Auth/Az) • Location-based security • Proximity to resource • Dorm camera • Closest health-care professional to respond • Security classification of data • While “outside” higher level of encryption is necessary
WLAN Security Protocol-based Attacks
WLAN Security – Protocol-based Attacks • Before 802.11i • MAC-layer Disassociation Frames did not need to be authenticated and associated • MAC Spoofing and MITM attacks were easy • AirJack • MonkeyJack • …
802.11i Frame Classes (cont.) • Class 1 Frames (Unauthenticated/Unassociated): • Control Frames (RTS/CTS/ACK/CF-ACK/CF-END) • Mgmt Frames (Probe Req/Resp; Beacon; Authentication; Deauthentication; Ad-hoc Data; Announcement Traffic Indication Message (ATIM) ) • Class 2 Frames (Authenticated/Unassociated): • Mgmt Frames (Association Req/Resp within RSN; Reassociation Req/Resp; Disassociation) Note: Association/Reassociation req/resp messages must be authenticated and integrity protected using key material derived during 802.1x authentication. • Class 3 Frames (Authenticated/Associated): • Data Frames (“To DS” or “From DS” FC bits set to “TRUE”; WEP bit set) • Management Frames (Deauthentication; implies Disassociation as well, changing the STA’s state from 3 to 1) • Control Frames (PS-Poll)
WLAN Protocol-based Attacks • Clear Channel Assessment (CCA) Attacks • Assoc. Prof. Mark Looi (Queensland University of Australia) • Exploits the CSMA/CA CCA function at the physical layer • Causes all WLAN nodes within range (clients and APs) to defer transmission of data for the duration of the attack • Channel seen as “busy”
WLAN Protocol-based Attacks (cont.) • Announcement Traffic Indicator Mode (ATIM) • Class 1 (Unauthenticated/Unassociated) 802.11 Management Frame • Sends “Busy” message to cause other devices on network to wait for media to become available
WLAN Protocol-based Attacks WLAN Dos Detection
WLAN Protocol-based Attacks • WLAN DoS Detection • Thresholds on Protocol-based attacks • Filters for known probes (Netstumbler, Kismet, etc.) • Correlation across enterprise to ensure sophisticated attacks are detected • MAC spoofing across subnets
WLAN Protocol-based Attacks Detection without Mitigation is half the battle
Wireless Intrusion Detection/Protection • DoS Attack Detection/Mitigation • Mgmt Frame Floods • RF Jamming • Auth/De-auth Floods • Probe Req. Floods • Fake AP Floods • EAPOL Floods • Rogue AP Containment • Misconfigured AP Reporting AM
Wired DoS Detection/Mitigation Security Threat Management • Mitigation of attacks to wired network • Core Appliance (Processes <= 20K Events/sec) • Firewalls, IDS, Routers, Switches, etc • Network Discovery with real-time “Hot Spots” • Data Reduction (e.g. 2.3MM syslog messages to 17 Actionable Events) • Optimal choke point and rule/ACL to mitigate attacks
WLAN Protocol-based Attacks DoS Mitigation
Services Secure WiFi Architecture Design Secure WiFi Implementation Managed WIDS/IPS WiFi Asset Management WiFi Security Training Benefits Mission-critical WiFi Infrastructure Ubiquitous WiFi Access Centralized WiFi Management CAPEX/OPEX savings Significant ROI S.W.I.M. – WLAN Security as an Enabling Technology
Best Practices in WLAN Security Questions?
More Information? http://wifi.bithgroup.com