Project Description The project basically consists of three main components-Attacker, Defender, and...

7
Project Description The project basically consists of three main components- Attacker, Defender, and Observer. Our project scenario is the following: A user is using a wireless network service through Access Point, then Attacker will do Attack on the wireless network(user). Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.
  • date post

    22-Dec-2015
  • Category

    Documents

  • view

    218
  • download

    2

Transcript of Project Description The project basically consists of three main components-Attacker, Defender, and...

Project Description

The project basically consists of three main components-Attacker, Defender, and Observer.

Our project scenario is the following:A user is using a wireless network service through Access Point, then Attacker will do Attack on the wireless network(user). Observer is monitoring what is on the airwaves and send log file to Defender. Defender will analyze log files from the observer, categorize attack patterns and report to network administrator for wireless network troubleshooting.

An architecture to detect 802.11 Attackers

Cloud

AP

User

Mornitoring

Analyzer

User PDA

Attacker

Components to achieve protecting 802.11 attacks

•Monitoring wireless networking Between attacker and defender•Show what happen in the network graphically by using GUI

•Analyze vulnerabilities of 802.11 protocols•Setup various attack daemons to exploit critical security holes of 802.11.

•Analyze log files from the observer•Categorize attack patterns by using XML•Detect attackers•Report “under attack”

Attacker(sonjong) Defender(eunyong)

Observer(jaemoo)

Features

Bare Essentials: Attack program(at least two) networking(Decode captured frames, Filter the captured frames)

Attack recognizer GUI

Build our own access point on laptop

Desired Features: Real-time monitoring Scan all the available channels

Monitoring program properly works under all manufactured NIC.

Report statistical data(e.g. Graph) Block attacker or hacker GUI Alert under attack

Bells and Whistles: Detect more attacking and hacking programs

Schedule2/7/04 Research vulnerabilities of 802.11 protocols

2/14/04 Research vulnerabilities of 802.11 protocolsSetup device(Linux and NICs on laptop)

2/21/04 Modify one of NICs to malicious NICDecode captured framesDesign log file formatResearch vulnerabilities of 802.11 protocols

2/28/04 Modify one of NICs to a malicious NICProgram to scan all the available channels in the airDecode captured framesDesign log file formatResearch vulnerabilities of 802.11 protocols

3/5/04 Filter the captured framesParse log file to extract useful dataResearch vulnerabilities of 802.11 protocols

3/12/04 Setup and test attack at homeFilter the captured framesParse log file to extract useful dataResearch vulnerabilities of 802.11 protocols

3/19/04 Setup and test attack at homeDesign GUIProgram to analyze log file

3/21/04 Setup and test attack at homeBuild GUIReport statistical dataProgram to analyze log file

3/22/04 Prototype demonstration

3/26/04 TroubleshootingBuild GUI

3/27 - 4/25 Speed distributionsMonitor real-time network utilizationBuild GUIProgram to analyze log file

4/26/04 Final project demonstration