* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Enterprise Wireless LAN (WLAN) Management
Wireless USB wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Deep packet inspection wikipedia , lookup
Airborne Networking wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Network tap wikipedia , lookup
Enterprise Wireless LAN (WLAN) Management and Services Jitu Padhye (Joint work with Ranveer Chandra, Alec Wolman, Brian Zill & Victor Bahl) Wireless Network Woes • Corporations spend lots of $$ on WLAN infrastructure – Worldwide enterprise WLAN business expected to grow from $1.1 billion this year to $3.5 billion in 2009 • Wireless networks perceived to be “flaky”, less secure – Microsoft’s IT Dept. logs several hundred complaints / month – Users complain about: Lack of coverage, performance, reliability Authentication problems (802.1x protocol issues) – Network administrators worry about Providing adequate coverage, performance Security and unauthorized access – DefCon 2005 : WiFi Pistol, WiFi Sniper Rifle, WiFi Bouncing, AirSnarf box Better WLAN management system needed! Requirements for a WLAN Management System Mobile Clients Integrated location service Problems may be location-specific Complex signal propagation in indoor environment Many orthogonal channels Asymmetric links Multiple monitors Dense deployment Scalable Self-configuring Cope with incomplete data State of the Art AP-based monitoring (Aruba, AirDefense, ManageEngine …) – Pros: Easy to deploy (APs are under central control) – Cons: Can not detect coverage problems using AP-based monitoring Single radio APs can not be effective monitors Limited coverage even with dual-radio APs – MS IT currently uses dual-radio APs from Aruba Specialized sensor boxes (Aruba, AirTight, …) – Pros: Can provide detailed signal-level analysis – Cons: Expensive, so can not deploy densely Monitoring by mobile clients – Research prototype @ MSR [Adya et. al., MobiCom’04] – Pros: Inexpensive, suitable for un-managed environments (Ranveer’s talk). – Cons: Coverage not predictable (clients are mobile) Lack of density Battery power may become an issue Only monitor the channel they are connected on Observations • Desktop PC’s with good wired connectivity are ubiquitous in enterprises + • Outfitting a desktop PC with 802.11 wireless is inexpensive – Wireless USB dongles are cheap As low as $6.99 at online retailers – PC motherboards are starting to appear with 802.11 radios built-in Combine to create a dense deployment of wireless sensors DAIR: Dense Array of Inexpensive Radios Details: HotNets’05, MobiSys’06 Key Characteristics of DAIR • High sensor density at low cost – Effective monitoring of multiple channels in indoor environments – Tolerates failure of a few sensors – Leverages existing desktop resources • Sensors are stationary – Provides predictable coverage – Permits meaningful historical analysis – Makes it easier to build an integrated location service Accuracy improves with sensor density • Completely self-configuring – Ease of deployment DAIR Architecture AirMonitor AirMonitor Commands Land Monitor Summarized Data Wired Network Commands and Database Queries Data from database Inference Engine Data to inference engine Summarized data from Monitors Database Other data: SNMP, Configuration Monitor Architecture Command Issuer Command (Enable/Disable Filter/ Send Packets) Remote Object Heart Beat Command Processor Sender Packet Constructor WiFi Parser Enable/Disable Filters Send Packet Filter Processor Filter Filter DHCP Parser Filter Other Parser Packet Enable/Disable Promiscuous/Logging Deliver Packets to all the Registered Filters Driver Interface Send Packets/ Query Driver SQL Client Dump summarized data into the SQL Tables Get Packets/Info from the Device Custom Wireless Driver Summarized Packet Information Wired NIC Driver SQL Server Managing Existing WiFi Networks using DAIR Security Applications – Detect Rogue APs, DoS attacks Response: – Locate AP, Inform netops – Launch DoS attacks against Rogue APs Performance management – Monitor RF coverage: Detect poor coverage, RF holes Response: – Locate region of poor coverage – Provide temporary coverage until an AP can be installed – Load balancing: Detect overload, congestion, flash crowd, rate anomaly Response: – DAIR nodes temporarily serve as APs or repeaters – Reconfigure AP power levels (cell breathing) Location service to support above applications Overview of location service • Distinguishing features: – – – Self-configuring Can locate un-cooperative transmitters (e.g. unauthorized APs) Office-level accuracy • How it works: 1. 2. 3. AirMonitors locate themselves AirMonitors regularly profile the environment to determine radio propagation characteristics Inference engine uses profiles and observations from multiple AirMonitors to locate clients, sources of interference (DoS attack?), determine regions of poor performance Example Application: Detecting Rogue AP Problem: – Careless employee brings AP from home, attaches it to the corporate network – Bypasses security measures like 802.1x, allows unauthorized clients to gain access – Once rogue network is installed, physical proximity is no longer needed Simple solution: (state of the art) – Build database of authorized SSIDs (Network Names) and BSSIDs (AP MAC Addresses) – Whenever an unknown entity appears (either SSID or BSSID), raise alarm False positives: – Reason: Shared office building – Solution: determine whether suspect AP is connected to corporate wired network Array of tests: association test, src/dst address test, replay test False negatives: – Reason: Malicious user configures rogue AP with valid SSID/BSSID – Solution: use location and breaks in packet sequence numbers to disambiguate Current deployment • Testbed: 40 nodes on one floor – Operational since Nov’05 • NetGear USB Wireless Adapter – Custom driver • Database server: MS SQL 2005 on 1.7GHz P4 with 1GB RAM • Inference engine server: 2GHz P4 with 512MB RAM • Nodes submit summary data every 2 minutes (randomized) • Inference engines query data every 1-3 minutes System Scalability • Load on database server < 75% • Additional load on desktops < 2-3% • Wired network traffic per node < 5Kbps One database server per building should be sufficient. Backup slides Demo ….. 1. Rogue AP detection and location 2. DoS attack (Disassociation attack) detection and location 3. Location-aware client performance monitoring See 2 & 3 during break after the talk How do AirMonitors locate themselves? • Monitor machine activity to determine primary user • Look up ActiveDirectory to determine office number • Parse office map to determine coordinates of the office • Verify and adjust coordinates by observing which AirMonitors are nearby Profiling the Environment to build a Radio Map Each AirMonitor periodically transmits beacons – • • • Repeat for various channels, power levels, various times of day Other AirMonitors record signal strength Inference engine fits curve(s) to collected observations The curve is a compact and approximate representation of the radio propagation characteristics of the environment 60 y = -1.4 x + 35.7 Normalized Signal Strength • 50 y = 60*e-0.11x 40 802.11a (5GHz) Normal office hours 3rd floor of building 112 30 20 33 AirMonitors 10 0 0 10 20 Distance 30 40 Determining location of clients (any “transmitter”) • AirMonitors capture packets from the client, report observed signal strength of database • Inference engine: 1. 2. Selects appropriate profile (frequency, time of day) Locates client using the observations from AirMonitors and the profile – Spring-and-ball algorithm for fast convergence