Understanding IT Network Security for Wireless and Wired Measurement Applications

30 Nov 2010
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
Understanding IT Network Security for Wireless and Wired Measurement Applications
1 sur 29

Contenu connexe

Tendances

Wireless network securityWireless network security
Wireless network securityVishal Agarwal
Securing wireless networkSecuring wireless network
Securing wireless networkSyed Ubaid Ali Jafri
Wireless network securityWireless network security
Wireless network securityShahid Beheshti University
Wireless security837Wireless security837
Wireless security837mark scott
Wireless security presentationWireless security presentation
Wireless security presentationMuhammad Zia
DncybersecurityDncybersecurity
DncybersecurityAnne Starr

En vedette

Wireless Network SecurityWireless Network Security
Wireless Network SecurityGyana Ranjana
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
Network managementNetwork management
Network managementMohd Arif
WiMAX Basics WiMAX Basics
WiMAX Basics Jarin Tasnim Khan
WimaxWimax
WimaxShayan Asadbeygi
wimax Ppt for seminarwimax Ppt for seminar
wimax Ppt for seminarPratik Anand

Similaire à Understanding IT Network Security for Wireless and Wired Measurement Applications

wi-fi technologywi-fi technology
wi-fi technologytardeep
Recent Trends in Wireless communicationRecent Trends in Wireless communication
Recent Trends in Wireless communicationJigsAshley
Wireless Network securityWireless Network security
Wireless Network securityFathima Rahaman
Wireless and how safe are youWireless and how safe are you
Wireless and how safe are youMarcus Dempsey
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad

Dernier

Empowering City ClerksEmpowering City Clerks
Empowering City ClerksOnBoard
GDSC ZHCET Google Study Jams 23.pdfGDSC ZHCET Google Study Jams 23.pdf
GDSC ZHCET Google Study Jams 23.pdfAbhishekSingh313342
"The Intersection of architecture and implementation", Mark Richards"The Intersection of architecture and implementation", Mark Richards
"The Intersection of architecture and implementation", Mark RichardsFwdays
Brisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptxBrisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptx
Brisbane MuleSoft Meetup 13 MuleSoft Maven and Managing Dependencies Part 1.pptxBrianFraser29
"Intro to Stateful Services or How to get 1 million RPS from a single node", ..."Intro to Stateful Services or How to get 1 million RPS from a single node", ...
"Intro to Stateful Services or How to get 1 million RPS from a single node", ...Fwdays
alfred-product-research-proposal.pdfalfred-product-research-proposal.pdf
alfred-product-research-proposal.pdfAlfredSuratos

Dernier(20)

Understanding IT Network Security for Wireless and Wired Measurement Applications

Notes de l'éditeur

  1. Layer 3 switch vs a router is just in the hardware implementationhttp://compnetworking.about.com/od/hardwarenetworkgear/f/layer3switches.htm
  2. The COTS technology trend has led to the convergence of previously disparate groups
  3. Proven technologies that are simpler to integrate, require widely available skills, secure, and reliableSave money by moving away from expensive, closed, factory-floor optimized networksIn other words, better visibility and better management
  4. On April 23, 2000 VitekBoden was arrested with stolen radio equipment, controller programming software on a laptop and a fully operational controllerThe facts of the case:Vitek worked for the contractor involved in the installation of Maroochy Shire sewage treatment plant.Vitek left the contractor in December 1999 and approached the shire for employment. He was refused.Between Jan and Apr 2000 the sewage system experienced 47 unexplainable faults, causing millions of liters of sewage to be spilled.http://www.cso.com.au/article/151361/utility_hack_led_security_overhaulSystem downtime = lost $$Loss of critical dataOutagesPerformance degradationRegulated products means loss of data is criticalLoss of customer satisfactionNoncompliance penaltiesCorporate imageThreatsMalware (viruses, worm, trojan horse)Distributed DoSEavesdroppingUnauthorized accessBandwidth/Jitter (YouTube affect)
  5. Hub –collects incoming traffic (TCP/IP packets) from each port and repeats the traffic to all other ports, whether the traffic is addressed to those ports or not.Switch – inspects each incoming TCP/IP packet before sending it to an appropriate destination, based on its media access control (MAC) address. Router (Layer 3 Switch) – serves as an intermediate destination for packets traveling between LANs in a corporate network orbetween a LAN and the Internet.WAP – wireless access point provides a wireless extension to the wired network
  6. Need to talk about stateful, packet inspection, etc.A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria.
  7. VLANs divide physical networks into smaller logical networks to increase performance, improve manageability, and simplify network design. VLANs are achieved through configuration of Ethernet switches. Each VLAN consists of a single broadcast domain that isolates traffic from other VLANs. Just as replacing hubs with switches reduces collisions, using VLANs limits the broadcast traffic, as well as allowing logical subnets to span multiple physical locations. There are two categories of VLANs: 􀀟 Static, often referred to as port-based, where switch ports are assigned to a VLAN so that it is transparent to the end user 􀀟 Dynamic, where an end device negotiates VLAN characteristics with the switch or determines the VLAN based on the IP or hardware addresses. Although more than one IP subnet may coexist on the same VLAN, the general recommendation is to use a one-to-one relationship between subnets and VLANs. This practice requires the use of a router or multi-layer switch to join multiple VLANs. Many routers and firewalls support tagged frames so that a single physical interface can be used to route between multiple logical networks. VLANs are not typically deployed to address host or network vulnerabilities in the way that firewalls or IDSs are. However, when properly configured, VLANs do allow switches to enforce security policies and segregate traffic at the Ethernet layer. Properly segmented networks can also mitigate the risks of broadcast storms that may result from port scanning or worm activity. VLAN is a Layer 2/Ethernet conceptPorts on a switch are assigned to a VLANSwitch interconnections are “trunk” ports that carry multiple VLANsData is only forwarded to ports within the same VLANBroadcasts and multicasts are restricted to their respective VLANsA Layer 3 device (router or Layer 3 switch) can pass messages between different VLANsRouter: subnets, IPSwitch: VLAN, MAC
  8. Mostly used (traditionally) for VOIP….why? Because it needs low latency…it’s important, time critical data….is this not also true of instrumentation???Points of aggregationLinks and buffersPoints of substantial speed mismatchTransmit buffers tend to fillBuffering reduces loss, introduces delay
  9. Speak their languageCatepillar
  10. 1 decryption / us  ok today’s machine10^6 decryption / us  massively parallel organizations of microprocessorsFor effective protection of wireless data transmissions, a Wi-Fi network must have a strong encryption algorithm (cipher) and some form of key management. Two encryption standards are widely used today with Wi-Fi networks: TKIP and AES. The IEEE 802.11i task group introduced the Temporal Key Integrity Protocol (TKIP) with WPA as a stop gap for existing WEP networks. Access points and clients can upgrade from WEP to WPA/TKIP with a simple firmware or software change. One advantage of TKIP over WEP is that it uses a 128-bit key versus a 40-bit key, though the encryption algorithm (RC4) is still the same. The more significant difference is that TKIP uses a different key for every message packet, hence the name “temporal.” This key is created dynamically by mixing a known pairwise transient key (PTK) with the MAC address of the client and a serial number for each packet. The PTK is created when a client connects to an access point using a preshared key (a passphrase that is known to all network members) and a random number generator. The serial number is incremented each time a new packet is sent. This means that replay attacks are impossible, because the same key is never used from one packet to the next. An access point can detect when an attacker attempts to replay old packets.  
  11. As final security solution, the IEEE 802.11i task group chose the Advanced Encryption Standard (AES) as the preferred encryption algorithm for Wi-Fi networks. Unlike TKIP, AES requires hardware upgrades for most WEP installations, because the cryptographic algorithm is more processor intensive. AES uses a 128-bit cipher that is significantly more difficult to crack than the RC4 algorithm used by TKIP and WEP. In fact, the National Institute of Standards and Technology (NIST) chose AES as the encryption standard required for all US government agencies. (FIPS publication 197  describes these requirements in detail.) Any wireless data acquisition application for the government or military will likely have to use AES to transmit data.  http://csrc.nist.gov/publications/fips/fips197/fips-197.pdfIn 1999, the Electronic Frontier Foundation’s “Deep Crack” machine, in combination with distributed.net, successfully solved RSA’s DES Challenge III in 22 hours and 15 minutes.DES $10,000 28 January 1997, 9 am PST 17 June 1997, 10:40 pm PST 140 daysNIST StandardSupport 128, 192 and 256 key sizesResult of a selection process where the World’s cryptographic community participatedThe Rijndael algorithm was selected as the AES algorithm in 2001Fast implementations in both software and hardwareSmall memory footprint
  12. When there’s no RADIUS server (WPA2-PSK), the access point serves both roles (simplifies setup)
  13. When we speak to someone on the phone, we rely on our recognition of theperson’s voice on the other end of the phone. Our conversations are based ontrusting our ability to identify the other party. When we speak to someone for thefirst time, we want to get information from them before we divulge anyinformation. We might ask them their name, why they are calling, and even howthey discovered our phone number. The world of WLAN communication is nodifferent. Wireless network administrators needed a means by which to ensurethat wireless clients could authenticate themselves to access points.
  14. When a supplicant requests access to a network, the authenticator provides access to uncontrolled ports for authentication. The authenticator forwards the access request to the authentication server, which either accepts or denies access to the supplicant. The authenticator forwards the response from the authentication server to the supplicant and either grants access to controlled ports or continues to block a denied supplicant.  A successful authentication process results a pairwise master key (PMK) used to encrypt wireless traffic. The details of this exchange depend on which Extensible Authentication Protocol (EAP) method the network supports.
  15. EAP is an authentication framework, not a specific authentication mechanism.There are tradeoffs for each, but ultimately this is the job of the IT department to decide what works best for them…we can handle the most common typesSome require client side, others are server sidestandard leaves the upper layerauthentication choice up to the enterprise. Enterprises must make a decisionbased on many different factors including, but not limited to, interoperability, cost,and administrative overhead. While the Wi-Fi alliance has made no attempts tohide their recommendation of implementing EAP-TLS for upper-layerauthentication, the 802.11i taskforce has stayed away from making suchrecommendations.
  16. AES-CCM-128802.15.4 stops short of defining cryptographic key management….
  17. Coordinator This device starts and controls the network. The coordinator stores information about the network, which includes acting as the Trust Center and being the repository for security keys. Router These devices extend network area coverage, dynamically route around obstacles, and provide backup routes in case of network congestion or device failure. They can connect to the coordinator and other routers, and also support child devices. End Devices These devices can transmit or receive a message, but cannot perform any routing operations. They must be connected to either the coordinator or a router, and do not support child devices.
  18. ISA SP99