Top Banner
Project Description The project basically consists of three main components- Attacker, Defender, and Observer. Our project scenario is the following: A user is using a wireless network service through Access Point, then Attacker will do Attack on the wireless network(user). Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.
7

Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

Project Description

The project basically consists of three main components-Attacker, Defender, and Observer.

Our project scenario is the following:A user is using a wireless network service through Access Point, then Attacker will do Attack on the wireless network(user). Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.

Page 2: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

An architecture to detect 802.11 Attackers

Cloud

AP

User

Mornitoring

Analyzer

User PDA

Attacker

Page 3: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

Components to achieve protecting 802.11 attacks

•Monitoring wireless networking Between attacker and defender•Show what happen in the network graphically by using GUI

•Analyze vulnerabilities of 802.11 protocols•Setup various attack daemons to exploit critical security holes of 802.11.

•Analyze log files from the observer•Categorize attack patterns by using XML•Detect attackers•Report “under attack”

Attacker(sonjong) Defender(eunyong)

Observer(jaemoo)

Page 4: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

Features

Bare Essentials: Attack program(at least two) networking(Decode captured frames, Filter the captured frames)

Attack recognizer GUI

Build our own access point on laptop

Desired Features: Real-time monitoring Scan all the available channels

Monitoring program properly works under all manufactured NIC.

Report statistical data(e.g. Graph) Block attacker or hacker GUI Alert under attack

Bells and Whistles: Detect more attacking and hacking programs

Page 5: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

Schedule2/7/04 Research vulnerabilities of 802.11 protocols

2/14/04 Research vulnerabilities of 802.11 protocolsSetup device(Linux and NICs on laptop)

2/21/04 Modify one of NICs to malicious NICDecode captured framesDesign log file formatResearch vulnerabilities of 802.11 protocols

2/28/04 Modify one of NICs to a malicious NICProgram to scan all the available channels in the airDecode captured framesDesign log file formatResearch vulnerabilities of 802.11 protocols

3/5/04 Filter the captured framesParse log file to extract useful dataResearch vulnerabilities of 802.11 protocols

Page 6: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

3/12/04 Setup and test attack at homeFilter the captured framesParse log file to extract useful dataResearch vulnerabilities of 802.11 protocols

3/19/04 Setup and test attack at homeDesign GUIProgram to analyze log file

3/21/04 Setup and test attack at homeBuild GUIReport statistical dataProgram to analyze log file

3/22/04 Prototype demonstration

Page 7: Project Description The project basically consists of three main components-Attacker, Defender, and Observer. Our project scenario is the following: A.

3/26/04 TroubleshootingBuild GUI

3/27 - 4/25 Speed distributionsMonitor real-time network utilizationBuild GUIProgram to analyze log file

4/26/04 Final project demonstration