You are on page 1of 26

ON

IP SPOOFING
A technical seminar report Submitted in partial Fulfillment of the requirement for the Degree of Bachelor of Engineering under BPUT

Submitted by
Chiranjeev kumar
Regd. No. : 0801215343 Year : 2011-2012

DEPARTMENT OF INFORMATION TECHNOLOGY

EASTERN ACADEMY OF SCIENCE AND TECHNOLOGY BHUBANESWAR

ABSTRACT
If we have a computer network in our home or office, there are several different ways to connect the computers together. Wi-Fi is the wireless way to handle networking. It is also known as 802.11 networking or wireless networking. The big advantage of Wi-Fi is its simplicity and inexpensive. We can connect computers anywhere in our home or office without the need for wires. The computers connect to the network using radio signals and computers can be up to 100 feet or so apart.

Wi-Fi stands for Wireless Fidelity. It is used to define any of the wireless technology in the IEEE 802.11 specifications. Wi-Fi is a brand originally licensed by the Wi-Fi Alliance which is a body responsible for promoting the term and its association with various wireless technology standards.

Wi-Fi was intended to be used for mobile devices and LANs, but is now often used for internet access. It enables a person with a wireless-enabled computer or personal digital assistant (PDA) to connect to the internet when in proximity of an access point. Wi-Fi also allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other.

DEPT. OF INFORMATION TECHNOLOGY

EASTERN ACADEMY OF SCIENCE AND TECHNOLOGY BHUBANESWAR

Certificate
This is to certify that

Chiranjeev kumar
Technology,
Technology,

bearing Regd. No. : 0801215343 student of 7th semester, Branch: Information Eastern Academy of Science

and

Bhubaneswar has submitted report on

IP SPOOFING
This is required for the fulfillment of Bachelors Degree in Information Technology underBPUT. GUIDED BY:

SEMINAR-IN-CHARGE

H.O.D

ACKNOWLEDGEMENT
I am heartily thankful to the Authority of my college and Information Technology Department for permitting me to undergo this useful and interesting seminar on the topic of IP SPOOFING. This topic mainly deals with the effects of technology in each and every individuals life, society and nation and its consequences.

I am grateful to H.O.D .......................................................and my seminar guide.& all faculty members of Information Technology who had given valuable guidance throughout the study of this topic. They not only supervised and guided the work but also were instrumental in creating an urge and insight necessary for this seminar.

CHIRANJEEV KUMAR BRANCH: INFORMATION TECHNOLOGY REG. NO.:080125343

CONTENTS

1. Introduction 2. Wi-Fi Technology 3. Wi-Fi Topology 4. Wi-Fi Architecture 5. Elements of Wi-Fi Network 6. How a Wi-Fi Network Works 7. Wi-Fi Applications 8. Wi-Fi Security Threats 9. Wi-Fi Security Techniques 10.Advantages 11.Limitation 12. Conclusion 13. Reference

INTRODUCTION WI-FI
Wi-Fi is acronym for wireless fidelity. Wi-Fi (also Wi-Fi, wifi, etc.) is a brand originally licensed by the Wi-Fi Alliance to describe the underlying technology of wireless local area networks (WLAN) based on the IEEE 802.11 specifications. Wireless Technology is an alternative to Wired Technology, which is commonly used, for connecting devices in wireless mode. It was developed by Kye Brown to be used for mobile computing devices, such as laptops, in LANs, but is now increasingly used for more services, including Internet and VoIP phone access, gaming, and basic connectivity of consumer electronics such as televisions and DVD players, or digital cameras. More standards are in development that will allow Wi-Fi to be used by cars in highways in support of an Intelligent Transportation System to increase safety, gather statistics, and enable mobile commerce. The term Wi-Fi is a play upon the decades-old term Hi-Fi. Hi-Fi stands for High Fidelity Hi-Fi is a quality standard that means the reproduction of sound or images is very faithful to the original. The term High Fidelity is applied to any reasonable quality home music system. A person with a Wi-Fi enabled device such as a computer, cell phone or PDA can connect to the Internet when in proximity of an access point. Wi-Fi also allows connectivity in peer-to-peer mode, which enables devices to connect directly with each other.

THE WI-FI TECHNOLOGY


Wi-Fi Networks use Radio Technologies called IEEE 802.11 standards to transmit & receive data at high speed. IEEE 802.11 comprised of more than 20 different standards each of which is denoted by a letter appended to the end of the name. The most familiar standards are: I. IEEE 802.11b II. IEEE 802.11a III. IEEE 802.11g

The standards 802.11b and 802.11g are used in the majority of commercial Wi-Fi devices. Both of these standards operate in the 2.4GHz band, and the only major difference between the two is the transfer rate.

I. IEEE 802.11b
Appear in late 1999 Operates at 2.4GHz radio spectrum 11 Mbps (theoretical speed) - within 30 m Range 4-6 Mbps (actual speed) 100 -150 feet range Pros of 802.11bLowest cost, signal range is best and is not easily obstructed. Cons of 802.11bSlowest maximum speed; support fewer simultaneous users; appliances may interfere on the unregulated frequency band.

II. IEEE 802.11a


Introduced in 2001 Operates at 5 GHz (less popular) 54 Mbps (theoretical speed) 15-20 Mbps (Actual speed) 50-75 feet range Pros of 802.11afastest maximum speed, supports more simultaneous users, regulated frequencies prevent signal interference from other devices. Cons of 802.11ahighest cost, shorter range signal that is more easily obstructed, not compatible with 802.11b

III.IEEE 802.11g
Introduced in 2003 Combine the feature of both standards (a,b) 100-150 feet range 54 Mbps Speed 2.4 GHz radio frequencies Pros of 802.11gFastest maximum speed; supports more simultaneous users Cons of 802.11gCosts more than 802.11b; appliances may interfere on the unregulated signal frequency.

WI-FI TOPOLOGY

WI-FI ARCHITECTURE
The typical Wi-Fi architecture shown below.

A typical Wi-Fi setup contains one or more Access points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier,

"Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at least 1 Mbit/s. based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to. The Wi-Fi standard leaves connection criteria and roaming totally open to the client.. Since Wi-Fi transmits in the air, it has the same properties as a non-switched Ethernet network.

ELEMENTS OF A WI-FI NETWORK


Wireless access point (sometimes called an "AP" or "WAP") serves to join or "bridge" wireless clients to a wired Ethernet network. Access points centralize all Wi-Fi clients on a local network in so-called infrastructure" mode. An access point in turn may connect to another access point, or to a wired Ethernet router. The AP is a wireless LAN transceiver or base station that can connect one or many wireless devices simultaneously to the Internet. The geographical region covered by one or more access points is called a hotspot.

Wireless access point

10

Wi-Fi cards - They accept the wireless signal and relay information. They can be internal and external. (E.g. PCMCIA Card for Laptop and PCI Card for Desktop PC) Wireless router-The centerpiece product of many home computer networks is a wireless router. These routers support all home computers configured with wireless network adapters (see below). They also contain a network switch to allow some computers to be connected with Ethernet cables. Wireless routers allow cable modem and DSL Internet connections to be shared.

Belkin router

Wireless adapter- A wireless network adapter allows a computing device to join a wireless LAN. Wireless network adapters contain a builtin radio transmitter and receiver. Each adapter supports one or more of the 802.11a, 802.11b, or 802.11g Wi-Fi standards.

Wireless network adapter

11

HOW A WI-FI NETWORK WORKS


A wireless network uses radio waves, just like cell phones, televisions and radios do. The communication across a wireless network is like two-way radio communication. 1. A computers wireless adapter translates data into a radio signal and transmits it using an antenna. 2. A wireless router receives the signal and decodes it. It sends the information to the internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computers wireless adapter. The radios used for Wi-Fi communication can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s. Adding Wi-Fi To Computers One of the best things about Wi-Fi is how simple it is. Many new laptops already come with a Wi-Fi card built in -- in many cases we don't have to do anything to start using Wi-Fi. It is also easy to add a Wi-Fi card to an older laptop or a desktop PC. Buy an 802.11a, 802.11b or 802.11g network card. For a laptop, this card will normally be a PCMCIA card that you slide into a PCMCIA slot on your laptop. Or you can buy a small external adapter and plug it into a USB port. For a desktop machine, you can buy a PCI card that you install inside the machine, or a small external adapter that you connect to the computer with a USB cable. Install the card
12

Install the drivers for the card Find an 802.11 hotspot. Access the hotspot. Hotspot: a connection point for a Wi-Fi network. It is a small box that is hardwired into the Internet. The box contains an 802.11 radio that can simultaneously talk to up to 100 or so 802.11 cards.

WI-FI APPLICATIONS

I. At home.

II. Small Businesses or SOHO (small office home office).

III. Large Corporations & Campuses.

IV. Health Care Centres.

V. Wireless ISP (WISP).

VI. Travellers during travelling (continuous change of locations).

13

WI-FI SECURITY THREATS


I. Wireless technology doesnt remove any old security issues, but introduces new ones Eavesdropping Man-in-the-middle attacks Denial of Service

Eavesdropping o Easy to perform, almost impossible to detect. o By default, everything is transmitted in clear text Usernames, passwords, content ... No security offered by the transmission medium o Different tools available on the internet Network sniffers, protocol analysers . . . Password collectors o With the right equipment, its possible to eavesdrop traffic from few kilometers away.

14

Man-In-The-Middle Attacks

o Attacker spoofs a disassociate message from the victim. o The victim starts to look for a new access point, and the attacker advertises his own AP on a different channel, using the real APs MAC address. o The attacker connects to the real AP using victims MAC address.

Fig-I MITM Attack

15

Denial of Service o Attack on transmission frequency used. i. ii. Frequency jamming Not very technical, but works

o Attack on MAC layer i. Spoofed deauthentication / disassociation messages ii. can target one specific user o Attacks on higher layer protocol (TCP/IP protocol) i. SYN Flooding

16

WI-FI SECURITY
(i) The requirements for Wi-Fi network security can be broken down into two primary components:

(ii)

Authentication a. User Authentication b. Server Authentication

(iii)

Privacy

Authentication

I.

Keeping unauthorized users off the network.

II.

User Authentication Authentication Server is used Username and password

III.Risk: Data (username & password) send before secure channel established. Prone to passive eavesdropping by attacker

IV.Solution Establishing a encrypted channel before sending username and password.

17

V. Server Authentication Digital Certificate is used. Validation of digital certificate occurs automatically within client software.

WI-FI SECURITY TECHNIQUES


Service Set Identifier (SSID) Wired Equivalent Privacy (WEP) 802.1X Access Control Wireless Protected Access (WPA) IEEE 802.11i Service Set Identifier (SSID)

SSID is used to identify an 802.11 network It can be pre-configured or advertised in beacon broadcast It is transmitted in clear text. Provide very little security

18

Wired Equivalent Privacy (WEP)

Provide same level of security as by wired network. Original security solution offered by the IEEE 802.11 standard. Uses RC4 encryption with pre-shared keys and 24 bit initialization vectors (IV). Key schedule is generated by concatenating the shared secret key with a random generated 24-bit IV (initialization vectors). 32 bit ICV (Integrity check value). No. of bits in key schedule is equalto sum of length of the plaintext and ICV (Integrity check value). 64 bit preshared key-WEP 128 bit preshared key-WEP2 Encrypt data only between 802.11 stations. Once it enters the wired side of the network (between access point) WEP is no longer valid Security Issue with WEP Short IV(initialization vectors). Static key Offers very little security at all.
19

Designed as a general purpose network access control mechanism. a. Not Wi-Fi specific Authenticate each client connected to AP (for WLAN) or switch port (for Ethernet). Authentication is done with the RADIUS server, which tells the access point whether access to controlled ports should be allowed or not. AP forces the user into an unauthorized state. User sends an EAP start message. AP returns an EAP message requesting the users identity. Identity send by user is then forwarded to the authentication server by AP. Authentication server authenticate user and return an accept or reject message back to the AP. If accept message is return, the AP changes the clients state toauthorized and normal traffic flows.

20

Fig-II 802.1x Access Control

21

WIRELESS PROTECTED ACCESS (WPA)

i)

WPA is a specification of standard based, interoperable security enhancements that strongly increase the level of data protection and access control for existing and future wireless LAN system.

ii)

User Authentication 802.1x EAP

WPA AND SECURITY THREATS

(i)

Data is encrypted a. Protection against eavesdropping and man-in-the-middle attacks.

(ii)

Denial of Service

a. Attack based on fake massages cannot be used.

b. As a security precaution, if WPA equipment sees two packets with invalid. MICs within a second, it disassociates all its clients, and stops all activity for a minute.

c. Only two packets a minute enough to completely stop a wireless network.

22

IEEE 802.11i

(i)

Provides standard for WLAN security.

(ii)

Authentication a. 802.1x

(iii)

Data encryption a. AES protocol is used.

(iv)

Secure fast handoff-This allow roaming between APs without requiring client to fully reauthenticate to every AP.

(v)

Will require new hardware.

ADVANTAGES
(i) It facilitates mobility.

(ii)

Ease of Installation.

(iii)

High flexibility.

(iv)

Cost is very less.

(v)

It is reliable and fast than other services.

(vi)

Security threats are less in this case.

23

(vii) Use unlicensed part of the radio spectrum.

(viii) Roaming is easily possible.

(ix)

Speed is very high it is even faster than the fastest cable modem connected to your personal computer.

LIMITATIONS

(i)

Interference from external intruders.

(ii)

Degradation in performance.

(iii)

High power consumption.

(iv)

Limited range.

24

CONCLUSION
It is just the beginning of Wi-Fi. We are starting to see the next phase of the Wi-Fi movement. So Wi-Fi is expected to become an even bigger and hotter technology for both home and businesses in the years to come. We can soon expect Wi-Fi networks to emerge in urban areas providing coverage throughout the central city, lining major highways, and giving travelers network access anytime , anywhere. .Wired vs. Wireless Wired Wireless Installation moderate difficulty easier, but beware interference Less More Cost reasonably high Reliability High Good Performance very good reasonably good reasonably good Security Limited outstanding Mobility If we are very cost-conscious, need maximum performance of your home system, and don't care much about mobility, then a wired Ethernet LAN is probably right for us. If on the other hand, cost is less of an issue, we like being an early adopter of leading-edge technologies, and we are really concerned about the task of wiring our home or small business with Ethernet cable, then we should certainly consider a wireless LAN. Any PC brought in a year becomes the hub of a wireless network. An estimated 99 million people with Wi-Fi by 2006 according to Gartner. Wires may soon be power alone.

25

REFERENCE
1. http://compnetworking.about.com 2. http://www.tcil-india.com 3. www.nbc4i.com/technology 4. http://computer .howstuffworks.com 5. http://www.crutchfieldadvisor .com 6. http://en.wikipedia.org/wiki/Wi-Fi

26

You might also like