DocumentCode :
3384600
Title :
Transparent IP layer Interception on Enterprise 802.11b/g Networks
Author :
Harrop, Warren ; Armitage, Grenville
Author_Institution :
Centre for Adv. Internet Archit., Swinburne Univ. of Technol., Melbourne, VIC
fYear :
2005
fDate :
21-24 Nov. 2005
Firstpage :
1
Lastpage :
5
Abstract :
Many enterprise sites utilise 802.11b/g technology to create an untrusted access network sitting outside their protected institutional IP network, with internal access allowed only through an IP-layer virtual private network (VPN) gateway. Often such networks do not implement link layer security, because of the known weaknesses of the IEEE´s wired equivalent privacy (WEP). This results in a wireless network on which arbitrary people can establish themselves as hosts with arbitrary IP addresses. Although the enterprise IP network is protected by the VPN gateway, users of the wireless network can become victims of unscrupulous (or accidental) interception of their IP communication. Common Windows laptop (mis-)configurations often try and establish communications through a default gateway on the 192.168/16 network. Anyone could configure another host as this default gateway on the enterprise 802.11b/g network and thus hijack a visitor´s network connection without the visitor even realising. In this paper we test and confirm the plausibility of this attack in a University wireless LAN and present results from real world data, confirming the existence of users failing to reconfigure their visiting host and attempting to connect via possible malicious gateways. We then suggest possible mitigation techniques.
Keywords :
IP networks; authorisation; business communication; data privacy; internetworking; virtual private networks; wireless LAN; IEEE wired equivalent privacy; IP address; IP communication; IP-layer virtual private network gateway; VPN gateway; Windows laptop configuration; enterprise 802.11b network; enterprise 802.11g network; internal access; link layer security; malicious gateway; network connection; protected institutional IP network; transparent IP layer interception; untrusted access network; wireless network; Australia; Cryptography; IP networks; Joining processes; Portable computers; Privacy; Protection; Virtual private networks; Wireless LAN; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
TENCON 2005 2005 IEEE Region 10
Conference_Location :
Melbourne, Qld.
Print_ISBN :
0-7803-9311-2
Electronic_ISBN :
0-7803-9312-0
Type :
conf
DOI :
10.1109/TENCON.2005.301137
Filename :
4085306
Link To Document :
بازگشت