Wireless Mobile Security
Wireless Mobile Security
Autonomous
(Approved by AICTE, New Delhi, Accredited by NBA (CIV, ECE, MECH, CSE), NAAC with ‘A+’ grade
& Permanently Affiliated to JNTU-GV Vizianagaram)
Dakamarri, Bheemunipatnam Mandal, Visakhapatnam Dist. – 531 162 (A.P.)
Ph: +91-8922-248001, 248002 Fax: + 91-8922-248011
e-mail: principal@raghuenggcollege.com website: www.raghuenggcollege.com
TYPES OF CRYPTOGRAPHY:
HASH FUNCTIONs:
Hash functions aim to give a representative result of the message’s content over
a limited number of bytes. They are pretty like a more sophisticated CRC (Cyclic
Redundancy Check).
The awaited properties of these hash functions are as follows:
– a result on a limited number of bytes (usually 16 or 20 bytes);
– inability to recover the original message from the outcome of the function;
– two messages that differ by only 1 bit produce two results that differ by at least
half a bit.
Several terms for hash functions like irreversible functions or one-way functions
are used indifferently. Several other terms for the result of the hash functions are
used like hash or fingerprint. Thereafter, the term “footprint” is used.
Several hash functions are today defined like a series of MD (Message Digest)
functions MD2, MD4 and MD5 which give a 16 byte fingerprint, but also algorithm
SHA-1 (Secure Hash Algorithm-1) which gives a 20 byte long result. Today MD5
and SHA-1 are the most frequently used. However, MD5 was recently proven
vulnerable to attack by collisions [LLO 06]. Indeed, within hours, it is possible to
find a message leading to the same footprint MD5.
A series of algorithms named SHA-256, SHA-224 and SHA-512 have been
invented by the NSA (National Security Agency) since 2000. They all derive from
SHA-1, but give results in a greater number of bits (256, 224 and 512 bits). SHA-
256 is today the most popular and is considered as the successor of SHA-1.
Limitations of MAC:
There are two major limitations of MAC, both due to its symmetric nature of operation −
Non-repudiation is the assurance that a message originator cannot deny any previously sent
messages and commitments or actions.
MAC technique does not provide a non-repudiation service. If the sender and receiver get
involved in a dispute over message origination, MACs cannot provide a proof that a message
was indeed sent by the sender.
Though no third party can compute the MAC, still sender could deny having sent the message
and claim that the receiver forged it, as it is impossible to determine which of the two parties
computed the MAC.
When We Need MAC Codes?
A sample scenario for using MAC codes is like this:
Two parties exchange somehow a certain secret MAC key (pre-shared key).
We receive a msg + auth_code from somewhere (e.g. from Internet, from the block
chain, or from email message).
We want to be sure that the msg is not tampered, which means that both the key and
msg are correct and match the MAC code.
In case of tampered message, the MAC code will be incorrect.
Authenticated Encryption: Encrypt / Decrypt Messages using MAC:
Another scenario to use MAC codes is for authenticated encryption: when we encrypt
a message and we want to be sure the decryption password is correct and the
decrypted message is the same like the original message before encryption.
First, we derive a key from the password. We can use this key for the MAC
calculation algorithm (directly or hashed for better security).
Next, we encrypt the message using the derived key and store the cipher text in the
output.
Finally, we calculate the MAC code using the derived key and the original message
and we append it to the output.
When we decrypt the encrypted message (cipher text + MAC), we proceed as follows:
First, we derive a key from the password, entered by the user. It might be the correct
password or wrong. We shall find out later.
Next, we decrypt the message using the derived key. It might be the original message
or incorrect message (depends on the password entered).
Finally, we calculate a MAC code using the derived key + the decrypted message.
If the calculated MAC code matches the MAC code in the encrypted message, the
password is correct. Otherwise, it will be proven that the decrypted message is not the
original message and this means that the password is incorrect
Digital Signature:
A digital signature is a mathematical technique used to validate the authenticity and integrity
of a message, software, or digital document.
Key Generation Algorithms: Digital signature is electronic signatures, which assure that
the message was sent by a particular sender. While performing digital transactions
authenticity and integrity should be assured, otherwise, the data can be altered or someone
can also act as if he was the sender and expect a reply.
Signing Algorithms: To create a digital signature, signing algorithms like email programs
create a one-way hash of the electronic data which is to be signed. The signing algorithm then
encrypts the hash value using the private key (signature key). This encrypted hash along with
other information like the hashing algorithm is the digital signature. This digital signature is
appended with the data and sent to the verifier. The reason for encrypting the hash instead of
the entire message or document is that a hash function converts any arbitrary input into a
much shorter fixed-length value. This saves time as now instead of signing a long message a
shorter hash value has to be signed and moreover hashing is much faster than signing.
Signature Verification Algorithms: Verifier receives Digital Signature along with the data.
It then uses Verification algorithm to process on the digital signature and the public key
(verification key) and generates some value. It also applies the same hash function on the
received data and generates a hash value. Then the hash value and the output of the
verification algorithm are compared. If they both are equal, then the digital signature is valid
else it is invalid.
The steps followed in creating digital signature are:
Message digest is computed by applying hash function on the message and then
message digest is encrypted using private key of sender to form the digital signature.
(digital signature = encryption (private key of sender, message digest) and message
digest = message digest algorithm(message)).
Digital signature is then transmitted with the message.(message + digital signature is
transmitted)
Receiver decrypts the digital signature using the public key of sender.(This assures
authenticity, as only sender has his private key so only sender can encrypt using his
private key which can thus be decrypted by sender’s public key).
The receiver now has the message digest.
The receiver can compute the message digest from the message (actual message is
sent with the digital signature).
The Message digest computed by receiver and the message digest (got by decryption
on digital signature) need to be same for ensuring integrity.
Message digest is computed using one-way hash function, i.e. a hash function in
which computation of hash value of a message is easy but computation of the message
from hash value of the message is very difficult.
Hashed value of original message is encrypted with sender's secret key to generate the
digital signature. It is generated by CA (Certifying Authority) that involves four steps:
Key Generation, Registration, Verification, and Creation. Authenticity of Sender,
integrity of the document and non-repudiation.
PUBLIC KEY INFRASTRUCTURE & KEY MANAGEMENT:
The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of
keys to achieve the underlying security service. The key pair comprises of private key
and public key.
Since the public keys are in open domain, they are likely to be abused. It is, thus,
necessary to establish and maintain some kind of trusted infrastructure to manage
these keys.
Key Management:
It goes without saying that the security of any cryptosystem depends upon how
securely its keys are managed. Without secure procedures for the handling of
cryptographic keys, the benefits of the use of strong cryptographic schemes are
potentially lost.
It is observed that cryptographic schemes are rarely compromised through weaknesses
in their design. However, they are often compromised through poor key management.
There are some important aspects of key management which are as follows −
Key management deals with entire key lifecycle as depicted in the following illustration
There are two specific requirements of key management for public key cryptography.
Secrecy of private keys : Throughout the key lifecycle, secret keys must remain secret from
all parties except those who are owner and are authorized to use them.
Assurance of public keys:
In public key cryptography, the public keys are in open domain and seen as public
pieces of data. By default there are no assurances of whether a public key is correct,
with whom it can be associated, or what it can be used for. Thus key management of
public keys needs to focus much more explicitly on assurance of purpose of public
keys.
The most crucial requirement of ‘assurance of public key’ can be achieved through
the public-key infrastructure (PKI), a key management systems for supporting public-
key cryptography.
As shown in the illustration, the CA accepts the application from a client to certify his public
key. The CA, after duly verifying identity of client, issues a digital certificate to that client.
Key Functions of CA
The key functions of a CA are as follows −
Generating key pairs − The CA may generate a key pair independently or jointly with the
client.
Issuing digital certificates − The CA could be thought of as the PKI equivalent of a passport
agency − the CA issues a certificate after client provides the credentials to confirm his
identity. The CA then signs the certificate to prevent modification of the details contained in
the certificate.
Publishing Certificates − The CA need to publish certificates so that users can find them.
There are two ways of achieving this. One is to publish certificates in the equivalent of an
electronic telephone directory. The other is to send your certificate out to those people you
think might need it by one means or another.
Verifying Certificates − The CA makes its public key available in environment to assist
verification of his signature on clients’ digital certificate.
Revocation of Certificates − At times, CA revokes the certificate issued due to some reason
such as compromise of private key by user or loss of trust in the client. After revocation, CA
maintains the list of all revoked certificate that is available to the environment.
Classes of Certificates
There are four typical classes of certificate −
Class 3 − These certificates can only be purchased after checks have been made about the
requestor’s identity.
Class 4 − They may be used by governments and financial organizations needing very high
levels of trust.
Hierarchy of CA
With vast networks and requirements of global communications, it is practically not
feasible to have only one trusted CA from whom all users obtain their certificates.
Secondly, availability of only one CA may lead to difficulties if CA is compromised.
In such case, the hierarchical certification model is of interest since it allows public
key certificates to be used in environments where two communicating parties do not
have trust relationships with the same CA.
The root CA is at the top of the CA hierarchy and the root CA's certificate is a self-
signed certificate.
The CAs, which are directly subordinate to the root CA (For example, CA1 and CA2)
have CA certificates that are signed by the root CA.
The CAs under the subordinate CAs in the hierarchy (For example, CA5 and CA6)
have their CA certificates signed by the higher-level subordinate CAs.
Certificate authority (CA) hierarchies are reflected in certificate chains. A certificate
chain traces a path of certificates from a branch in the hierarchy to the root of the
hierarchy.
The following illustration shows a CA hierarchy with a certificate chain leading from an
entity certificate through two subordinate CA certificates (CA6 and CA3) to the CA
certificate for the root CA.
Verifying a certificate chain is the process of ensuring that a specific certificate chain
is valid, correctly signed, and trustworthy.
The following procedure verifies a certificate chain, beginning with the certificate that
is presented for authentication –
A client whose authenticity is being verified supplies his certificate, generally along
with the chain of certificates up to Root CA.
Verifier takes the certificate and validates by using public key of issuer. The issuer’s
public key is found in the issuer’s certificate which is in the chain next to client’s
certificate.
Now if the higher CA who has signed the issuer’s certificate, is trusted by the verifier,
verification is successful and stops here.
Else, the issuer's certificate is verified in a similar manner as done for client in above
steps. This process continues till either trusted CA is found in between or else it
continues till Root CA.
What is Cryptographic Key Management?
Key exchange:
Key storage:
Key storage is basically the allocation of the keys. Distributed keys should be stored
securely. This is so done to ensure communication security. There are various
methods to ensure perfect storing of the cryptographic keys.
The most common technique employed for the purpose is an encryption application.
the application manages the key, and its usage depends on an access password to
control the use of the key.
Key Use
As the duration of the usage of keys increases, risk factors also shoot high. as the risk
of a hacker is directly proportional to its duration of use. That’s why the keys should
be frequently changed. This limits the loss of vulnerable information.
There are several challenges and threats that cause risks to the cryptographic keys. Following
are the challenges that are involved in cryptographic key management:
Reuse:
Sometimes improper reuse of the already used keys is also a threat to the protection of
cryptographic keys.
Non-rotation
Using the same older symmetric algorithms again and again increases the threat issue for the
keys. To avoid this key should be rotated and updated regularly.
Non destruction
If the expired keys are not destroyed immediately, it can lead to the accidental compromise
of future data. Thus, keys should be securely deleted leaving no trace, once they are expired.
Unencrypted keys
As keys ensure the safety of data, that’s why they should be stored encrypted. Because
unencrypted keys are vulnerable to risks even at an offline stage.
Insecure movement
Cryptography techniques often involve the movement of keys. When these keys are moved
insecurely, it can ultimately lead to data loss. Thus, the movement of keys should be
accomplished in an encrypted way via a pre-shared transport key.
Audit logging
The entire lifecycle of the key should be fully logged and recorded, to avoid any further
forensic investigation.
SECURE COMMUNICATION PROTOCOLS FOR MOBILE & WIRELESS
NETWORKS:
Network security protocols are network protocols that ensure the integrity and security of
data transmitted across network connections. The specific network security protocol used
depends on the type of protected data and network connection. Each protocol defines the
techniques and procedures required to protect the network data from unauthorized or
malicious attempts to read or exfiltrate information.
IPsec is a protocol and algorithm suite that secures data transferred over public
networks like the Internet. The Internet Engineering Task Force (IETF) released the
IPsec protocols in the 1990s. They encrypt and authenticate network packets to
provide IP layer security.
IPsec originally contained the ESP and AH protocols. Encapsulating Security Payload
(ESP) encrypts data and provides authentication, while Authentication Header (AH)
offers anti-replay capabilities and protects data integrity. The suite has since expanded
to include the Internet Key Exchange (IKE) protocol, which provides shared keys
establishing security associations (SAs). These enable encryption and decryption via a
firewall or router.
IPsec can protect sensitive data and VPNs, providing tunneling to encrypt data
transfers. It can encrypt data at the application layer and enables authentication
without encryption.
SSL and TLS—OSI Layer 5
The Secure Sockets Layer (SSL) protocol encrypts data, authenticates data origins,
and ensures message integrity. It uses X.509 certificates for client and server
authentication. SSL authenticates the server with a handshake, negotiating security
session parameters and generating session keys. It can then securely transmit the data
by authenticating its origin.
SSL sessions use cryptographic algorithms similar to the algorithms used by the client
and server (determined during the handshake). Servers may support encryption with
algorithms like AES and Triple DES.
X.509 server certificates are a requirement for SSL, enabling the client to validate the
server. SSL can also use X.509 client certificates for authentication. These certificates
must be signed by a trusted certificate authority in the server’s keying.
Transport Layer Security (TLS) is an SSL-based protocol defined by the IETF (SSL is
not).
Kerberos is a service request authentication protocol for untrusted networks like the
public Internet. It authenticates requests between trusted hosts, offering built-in
Windows, Mac, and Linux operating system support.
Windows uses Kerberos as its default authentication protocol and a key component of
services like Active Directory (AD). Broadband service providers use it to
authenticate set-top boxes and cable modems accessing their networks.
Systems, services, and users, only need to trust the KDC when using Kerberos. KDC
offers authentication and grants tickets to enable nodes to authenticate each other.
Kerberos uses shared secret cryptography to authenticate packets and protect them
during transmission.
SNMP is a network device management and monitoring protocol that works at the
application layer. It can secure devices on LANs or WANs. SNMP provides a shared
language to allow devices like servers and routers to communicate via a network
management system. SNMP is an original part of the Internet protocol suite defined
by the IETF.
Components of the SNMP architecture include a manager, an agent, and a
management information base (MIB). The manager is the client, the agent is the
server, and the MIB is the database. The SNMP agent responds to the manager’s
requests using the MIB. While SNMP is widely available, administrators must adjust
the default settings to enable communication between the agents and the network
management system to implement the protocol.
With the introduction of SNMPv3 in in 2004, the SNMP protocol gained three
important security features: encryption of packets to prevent eavesdropping, integrity
checks to ensure packets were not been tampered in transit, and authentication to
verify that communications come from a known source.
HTTP is an application protocol that specifies rules for web file transfers. Users
indirectly use HTTP when they open their web browser. It runs on top of the Internet
protocol suite.
HTTPS is the secure version of HTTP, securing the communication between browsers
and websites. It helps prevent DNS spoofing and man-in-the-middle attacks, which is
important for websites that transmit or receive sensitive information. All websites
requiring user logins or handling financial transactions are attractive data theft targets
and should be using HTTPS.
HTTPS runs over the SSL or TLS protocol using public keys to enable shared data
encryption. HTTP uses port 80 by default, while HTTPS uses port 443 for secure
transfers. With HTTPS, the server and browser must establish the communication
parameters before initiating data transfers.
SASE (Secure Access Service Edge) is an emerging network architecture that combines
network security functions with wide-area networking (WAN) capabilities, providing a
unified approach to network security and connectivity.
VIRTUAL PRIVATE NETWORK & ITS IMPLEMENTATION:
A virtual private network, or VPN, is an encrypted connection over the Internet from
a device to a network. The encrypted connection helps ensure that sensitive data is
safely transmitted. It prevents unauthorized people from eavesdropping on the traffic
and allows the user to conduct work remotely.
Conclusion: It’s important to note that while VPNs provide an added layer of security and
privacy, they are not a one-size-fits-all solution. VPNs can have varying levels of encryption,
logging policies, and performance. Additionally, some online activities may still be traceable
even when using a VPN, depending on the provider's policies and technical implementation.
Lastly, be cautious when using free VPN services, as they might not provide the same level
of security and privacy as paid services. Always research and choose a reputable provider
that aligns with your needs and values.
ACCESS CONTROL LISTS IN WIRELESS SECURITY:
An access control list (ACL) is a list of rules that specifies which users or systems are
granted or denied access to a particular object or system resource. Access control lists
are also installed in routers or switches, where they act as filters, managing which
traffic can access the network.
ACL in the context of wireless security typically stands for "Access Control List." An
Access Control List is a security mechanism used to control access to resources or
services based on a predefined list of permissions or rules. In wireless networking,
ACLs are often used to regulate access to Wi-Fi networks and associated resources.
MAC Address Filtering: Each network device (e.g., laptops, smartphones) has a
unique MAC (Media Access Control) address. ACLs can be configured to allow or
deny access to the network based on these MAC addresses. This means that only
devices with MAC addresses listed in the ACL are allowed to connect to the network.
IP Address Filtering: ACLs can also be based on IP addresses. Devices with specific
IP addresses can be allowed or denied access to the network. However, in dynamic IP
scenarios, this approach might not be as effective, since IP addresses can change.
Port-Based Filtering: This approach involves allowing or denying devices based on
specific network ports they are trying to access. For instance, you might allow access
to certain ports for internet browsing but block access to other ports for security
reasons.
Time-Based Access: ACLs can also be configured to allow or deny access to the
network during specific time intervals. This is useful for scenarios where you want to
restrict access during certain hours, like business hours or nighttime.
User-Based Access: Some more advanced systems allow ACLs to be tied to specific
user accounts. This is often seen in enterprise environments where employees have
unique credentials for accessing the wireless network.
It's important to note that while ACLs provide an additional layer of security, they are
not foolproof. Skilled attackers can potentially spoof MAC addresses, making MAC
address filtering less effective. Similarly, relying solely on IP addresses might not be
sufficient if devices use dynamic IP assignment.
For more robust wireless security, it's recommended to use a combination of security
measures such as strong encryption protocols (e.g., WPA2, WPA3), strong passwords
or passphrase, regular firmware updates, intrusion detection systems, and potentially
more advanced methods like IEEE 802.1X authentication.
Remember that wireless security is a constantly evolving field, and it's crucial to stay
updated with the latest best practices and technologies to ensure the security of your
network and data.
Wi-Fi SECUIRTY DEDICATED ARCHITECTURES:
Access Points (APs): These are the devices that provide wireless network connectivity. In a
dedicated WiFi security architecture, access points play a crucial role in implementing
security measures.
Wireless LAN Controller (WLC): The WLC is a centralized device that manages multiple
access points in a coordinated manner. It is responsible for enforcing security policies,
managing client connections, and distributing configuration changes to the APs.
Authentication Server: This server is responsible for verifying the identity of users or
devices trying to connect to the WiFi network. It plays a critical role in ensuring that only
authorized users gain access.
RADIUS Server: The Remote Authentication Dial-In User Service (RADIUS) server is used
to authenticate and authorize users attempting to connect to the wireless network. It works
closely with the authentication server to validate credentials.
Security Protocols:
WPA/WPA2/WPA3: These are encryption protocols that protect data transmission between
devices and access points. They ensure that data is transmitted securely and cannot be easily
intercepted.
802.1X: This is an authentication framework that enables port-based access control. It uses
the Extensible Authentication Protocol (EAP) to authenticate clients before granting network
access.
EAP-TLS: An EAP method that uses digital certificates for mutual authentication between
the client and the server, enhancing security.
EAP-PEAP: Protected EAP, which establishes a secure tunnel between the client and the
server, preventing eavesdropping.
Intrusion Detection/Prevention System (IDS/IPS): This system monitors network traffic for
suspicious activities or potential security breaches. It can block or mitigate attacks in real-
time.
Firewall: A network firewall can be integrated into the architecture to filter and control
incoming and outgoing traffic. This helps prevent unauthorized access and protects against
various types of attacks.
Explanation:
In this dedicated WiFi security architecture, the primary goal is to ensure that only authorized
users and devices can access the wireless network, and that the data transmitted over the
network remains secure. Here's how the components work together:
User Authentication: When a user or device attempts to connect to the WiFi network, they
are prompted to provide credentials. These credentials are sent to the authentication server,
which verifies their identity.
RADIUS Server: The RADIUS server communicates with the authentication server to
validate the provided credentials. If the credentials are correct, the RADIUS server sends an
access approval to the wireless LAN controller.
Wireless LAN Controller: The WLC enforces security policies and configuration settings
for the access points. It informs the relevant APs to allow the authenticated user/device to
join the network.
Security Protocols: Encryption protocols like WPA2 or WPA3 ensure that data transmitted
between the user/device and the access point is encrypted, preventing unauthorized access to
the data.
Firewall: The firewall filters incoming and outgoing traffic, allowing only authorized traffic
to pass through. It can be configured to block specific types of traffic or prevent known
malicious IPs from accessing the network.
Wi-Fi hotspot architecture allows users to connect to the internet through wireless access
points, typically in public locations like cafes, airports, hotels, and other public areas. Here's
an overview of the components and functioning of a typical Wi-Fi hotspot architecture:
Components:
Access Points (APs): These are the physical devices that provide wireless connectivity to
users' devices. APs are strategically placed within the hotspot area to ensure proper coverage.
Authentication Server: The authentication server is responsible for verifying the identity of
users who want to access the hotspot. It interacts with users during the login process and
grants access based on valid credentials.
RADIUS Server: The Remote Authentication Dial-In User Service (RADIUS) server is used
to authenticate and authorize users connecting to the hotspot. It communicates with the
authentication server to validate credentials and allow or deny access.
Captive Portal: A captive portal is a web page that users see when they attempt to connect to
the hotspot. It prompts users to provide login credentials or agree to terms of service before
granting access.
Backend Server: This server hosts the logic and databases required for user management,
accounting, and other backend processes. It manages user accounts, tracks usage, and
generates billing information if necessary.
Internet Gateway: The internet gateway is the point through which traffic from the hotspot
is forwarded to the internet. It can include routers, firewalls, and other networking
components to manage traffic flow.
Billing and Payment System (Optional): In some cases, a billing and payment system may
be integrated into the architecture to offer paid access to the hotspot. This system manages
payment processing and account activation.
Functioning:
User Association: When a user with a Wi-Fi-enabled device enters the hotspot area, their
device detects the available wireless network. They choose the network associated with the
hotspot.
Captive Portal Interaction: Upon selecting the hotspot's network, the user's device is
automatically redirected to the captive portal's login page. The user is prompted to provide
login credentials or agree to terms of service.
Authentication: The user's credentials are sent to the authentication server, which verifies
them using the RADIUS server. If the credentials are valid, the user is granted access.
Access Grant: Once the user is authenticated, the captive portal allows the user's device to
access the internet through the hotspot's access points.
Internet Access: The user's device can now browse the internet using the hotspot's internet
connection. All data traffic between the device and the internet gateway is managed by the
hotspot's network infrastructure.
Session Management: The backend server tracks user sessions, usage, and potentially
enforces session timeouts or data usage limits as defined by the hotspot's policies.
Logout and Session Termination: When the user decides to disconnect or their session
expires, the backend server terminates the session. The user may also log out manually from
the captive portal.
Billing and Accounting (If Applicable): If the hotspot offers paid access, the billing and
payment system manages the financial transactions, account creation, and subscription
management.
Overall, Wi-Fi hotspot architecture ensures that users can access the internet in a controlled
and secure manner while enabling administrators to manage user access, enforce terms of
use, and potentially monetize the service. The architecture's design and components can vary
based on the hotspot provider's goals, scale, and requirements.
WIRELESS INTRUSION DETECTION & PREVENTION SYSTEMS:
Signature Database:
Function: The signature database contains patterns and signatures of known attacks,
vulnerabilities, and malicious activities.
Functioning: The WIDPS compares network traffic against the signatures in the database to
identify matches. This helps detect and block well-known attack methods.
Configuration Management:
Function: This component is responsible for managing the configuration of the WIDPS
components.
Functioning: Configuration management allows administrators to customize the behavior of
the system, update signature databases, adjust detection thresholds, and fine-tune the overall
security settings to align with the network's needs.
Machine Learning and AI Techniques (Optional):
Function: Advanced WIDPS systems may incorporate machine learning and AI techniques to
enhance their detection capabilities.
Functioning: These techniques can adapt to new and evolving threats by learning from
historical data and patterns, allowing the system to identify novel attack vectors that
traditional methods might miss.
A wireless honeypot is a cyber security tool or system designed to attract and trap potential
attackers, allowing security professionals to study their tactics, techniques, and procedures
(TTPs) while keeping them away from actual critical systems and data. The term "honeypot"
is derived from the idea of luring malicious actors in, just like bees are attracted to honey.
Decoy Services: Simulated services, such as fake websites, servers, or databases, are set up
to appear as if they contain valuable or sensitive information. These decoy services are
designed to entice attackers into interacting with them.
Logging and Monitoring: The honeypot system must log all interactions, activities, and
traffic. This data is essential for analyzing attacker behavior, identifying vulnerabilities
they're targeting, and understanding their tactics.
Isolation: The honeypot should be isolated from the actual production network to prevent
any real systems or data from being compromised. Network segmentation techniques are
used to ensure separation.
Deception Techniques: Deception tactics can include fake login screens, bogus credentials,
and misleading data. These tricks are employed to manipulate attackers into revealing more
about their methods.
Alerting Mechanisms: The system should have mechanisms to alert security personnel when
an attacker is detected or when certain activities occur that could pose a threat.
Network Emulation Tools: These tools simulate network conditions, such as latency and
bandwidth, to make the honeypot environment more realistic.
Decoy Services: As mentioned earlier, simulated services and data are essential to attract
attackers. This could include fake web servers, FTP servers, or even IoT devices.
Intrusion Detection Systems (IDS): IDS tools monitor network traffic and system activities,
detecting unusual or malicious behavior that could indicate an attack.
Data Analysis Tools: After capturing attacker interactions, data analysis tools are used to
make sense of the collected data, identify attack patterns, and derive insights.
Implementation:
Define Goals: Determine the objectives of your honeypot deployment, such as gaining
insight into specific attack vectors or studying the behavior of certain types of attackers.
Select Honeypot Type: Choose the type of honeypot (e.g., high-interaction or low-
interaction) that aligns with your goals and available resources.
Choose Technology: Select the appropriate software, virtualization platform, and tools
needed to create and manage your honeypot environment.
Design Decoy Services: Set up decoy services that mimic real systems. For example, if
you're targeting web-based attacks, create fake websites and APIs.
Isolate the Environment: Ensure that the honeypot environment is isolated from your
production network to prevent any real harm.
Configure Monitoring and Logging: Set up logging mechanisms to capture all activities
and interactions within the honeypot environment.
Analyze Data: After interactions occur, analyze the captured data to gain insights into
attacker tactics and strategies.
Iterate and Improve: Use the information obtained to enhance your security measures,
refine your decoy services, and fine-tune your honeypot setup.
Alerting and Incident Response: Implement alerts and responses to notify security teams
when suspicious activities are detected within the honeypot.
Regular Maintenance: Keep the honeypot environment updated and monitor it consistently
to ensure it remains effective in attracting and studying attackers.
Remember that deploying a honeypot requires careful planning and consideration of legal and
ethical implications. Unauthorized engagement with attackers can lead to legal issues, so
ensure compliance with relevant laws and regulations.
FIREWALLS & THEIR FUNCTIONING:
Definition: A firewall is a network security device or software that acts as a barrier between
a trusted internal network and untrusted external networks, such as the internet. It enforces a
set of rules and policies to control and monitor incoming and outgoing network traffic,
helping to prevent unauthorized access, malicious activities, and data breaches.
Network Interfaces: Firewalls have at least two network interfaces: one connected to the
internal network (trusted side) and one connected to the external network (untrusted side).
Rule-Based Policy Engine: The heart of the firewall, this engine evaluates incoming and
outgoing traffic against a set of predefined rules and policies. It determines whether to allow,
deny, or log traffic based on these rules.
Packet Inspection:
Stateful Inspection: Firewalls maintain a state table that tracks the state of active
connections. Incoming traffic is evaluated against this table to determine if it's part of
an established connection.
Deep Packet Inspection (DPI): Some firewalls analyze the content of data packets to
identify applications, protocols, or even malicious code within the traffic.
Logging and Reporting: Firewalls log traffic activity, rule violations, and security events.
These logs are useful for troubleshooting, compliance audits, and security analysis.
Network Address Translation (NAT): Firewalls often perform NAT to hide internal IP
addresses from external networks, enhancing security and privacy.
Proxy Services: Some firewalls act as intermediaries (proxies) between internal clients and
external servers, adding an additional layer of security by isolating the internal network from
direct contact with external servers.
Functioning of Firewalls:
Packet Filtering: Firewalls inspect incoming and outgoing packets based on rules defined in
the policy. Packets that match the allowed criteria are permitted, while those that violate rules
are dropped or rejected.
Stateful Inspection: Firewalls maintain a record of active connections and track their state.
This allows the firewall to recognize legitimate responses to outbound requests and allow
corresponding inbound traffic.
Access Control Lists (ACLs): ACLs define what types of traffic are allowed or denied based
on factors like source and destination IP addresses, port numbers, and protocols.
Application Layer Filtering: Firewalls can analyze the payload of packets to determine the
applications or services generating the traffic. This enables more granular control over
specific applications.
Intrusion Detection and Prevention Systems (IDPS): Some advanced firewalls integrate
intrusion detection and prevention capabilities to identify and block known attack patterns.
Virtual Private Network (VPN) Support: Firewalls can enable secure communication over
untrusted networks by implementing VPN protocols and encryption.
Types of Firewalls:
Packet Filtering Firewalls: These examine packets' header information, such as source and
destination IP addresses, port numbers, and protocols, to make access control decisions.
Stateful Firewalls: They maintain a state table to track the state of active connections. This
helps in distinguishing legitimate traffic from unauthorized attempts.
Proxy Firewalls: Acting as intermediaries, proxy firewalls intercept traffic requests and then
initiate new requests on behalf of clients. This adds an extra layer of separation between
internal and external networks.
Application Layer Firewalls: Also known as Layer 7 firewalls; these operate at the
application layer and can make decisions based on the actual content of packets.
Cloud Firewalls: Designed specifically for cloud environments, these firewalls provide
security controls for virtual machines and resources within cloud platforms.
Definition of Authentication:
Authentication is the process of verifying the identity of a user, system, or entity attempting
to access a network, system, application, or service. It ensures that the claimed identity
matches the actual identity, granting authorized access while preventing unauthorized access.
Access Control: Authentication ensures that only authorized users are allowed to connect to
the wireless network, preventing unauthorized individuals or devices from gaining access.
Data Security: By verifying user identities, authentication helps secure sensitive data from
being intercepted or accessed by malicious entities.
Network Integrity: It helps maintain the integrity of the wireless network by preventing
unauthorized devices from causing disruptions or exploiting vulnerabilities.
Resource Allocation: Authentication ensures that network resources are allocated only to
legitimate users, optimizing network performance and preventing abuse.
Pre-Shared Key (PSK): This method involves sharing a secret passphrase or key between
the user/device and the network. The user/device presents the correct key during the
authentication process.
MAC Address Filtering: This method involves allowing only specific MAC addresses
(unique hardware addresses) to connect to the network. While it's not very secure on its own,
it can be used in conjunction with other methods.
Captive Portal Authentication: Commonly used in public Wi-Fi networks, a captive portal
presents a web page where users enter authentication credentials or accept terms of use before
gaining access.