Visual Techniques for Analyzing Wireless Communication Patterns

Visual Techniques for Analyzing Wireless Communication Patterns

Visual Techniques for Analyzing Wireless Communication Patterns Kyle Gancarz, Kenneth Prole Secure Decisions Division of Applied Visions, Inc. Northport, NY 11768 USA {kyle.gancarz, ken.prole}@securedecisions.com Abstract— New security concerns have emerged with the patterns of wireless access points (APs) and devices, widespread availability of easy-to-integrate, affordable wireless including their location and communication patterns. networking technology. To meet the growing challenges of analyzing IEEE 802.11 wireless traffic and assessing security risks, a system of wireless network visualization components Soon after wireless networking devices became was created to provide defenders with tools to analyze vast available Wireless Intrusion Detection Systems (WIDS) amounts of “wardriving” data, i.e., wireless radio signals were designed and deployed to prevent unwanted client collected while moving about an area in a car or on foot. This access and detection or blocking of rogue wireless access paper describes the data processing and visualization techniques that are utilized by the WiFi Flows visualization points. WIDS have an inherent limitation in that they must within MeerCAT® to provide a comprehensive picture of the be deployed in a way that covers the entire range of the communication patterns in a wireless network, to network wireless network - a costly proposition for large areas such defenders and analysts. This paper also describes the applicability of this technology in defending wireless networks. as military bases, large corporate campuses, airports, et cetera. We created the MeerCAT [2] software to allow Keywords- wireless communication patterns; visual anaytics; analysis of data collected from wardriving activity of widely information visualization; computer network security; wireless distributed wireless networks, giving network administrators discovery; wireless security; MeerCAT and defenders powerful visual analytics [3] with the flexibility of deploying their own collection methods (using Kismet, Netstumbler [4], or the U.S. Department of I. INTRODUCTION Defense’s Flying Squirrel [5]). MeerCAT possesses a When networking technology made the jump from a variety of visualizations including a geographic mapping of complex system of wires and switches to the air waves, wireless assets, a device and detection run explorer, timeline network defenders were met with a new challenge. history for devices, detailed information tables, and a WiFi Traditional techniques for securing and analyzing wired Flows visualization which maps out the communication computer networks are insufficient for preventing or patterns of the devices, among others. Each of the detecting a compromise using a wireless vector, or for visualizations is linked with all others and updates monitoring policy compliance. Not only can an uninvited dynamically as the user interacts with items in the views. guest connect to the network from across the street, they can These multiple coordinated views allow the user to see also intercept any raw communications on the wireless dependencies and correlations by presenting multiple network with just a wireless interface card and readily perspectives on the data that has been collected [3]. available tools such as Kismet [1]. Add to this the compromise of several widely adopted encryption This paper focuses on the WiFi Flows visualization techniques and the ability for any employee or guest to plug within MeerCAT and how raw wireless data is processed to an unauthorized, unsecured wireless device into the network present a clear view of how wireless devices are and a veritable problem is created for network communicating with each other. While traditional administrators and defenders. It is their job to implement the techniques for monitoring wired network communication convenience of wireless networks without compromising patterns in computer networks involve looking primarily at the security of their organization’s network. Analysts must the network layer of the TCP/IP model [3], the nature of find ways to derive valuable information about normal network services provided at the data link layer in IEEE versus anomalous behavior by analyzing the behavioral 802.11 networks makes analysis of that communication imperative to gaining a full understanding of wireless This research and development effort was supported by DARPA Strategic Technologies Office through a Small Business Innovation Research grant, under contract number W31P4Q-07-C-0022. network operations. It requires analysts to take a closer look traffic exchanged between two wireless devices. Link layer at point-to-point communication than would typically be addresses provide the basis for these flows and any network necessary on a traditional, wired Ethernet network where the layer information that can be deciphered from these packets individual hops a packet takes on its way to its destination is subsequently tacked onto the flow. Additionally, the are often overlooked. The emphasis is on communication flows are associated with independent abstractions of between hosts from the network layer up through the “wireless networks” and “wireless clients” that are used application layer. within other areas of MeerCAT. This allows the visualization to respond to interaction in other areas of A. What is Special about WiFi? MeerCAT as well as report any interaction within it to other views. Wireless networking devices handle discovery, authentication, encryption, connection management, and II. Technical Approach other critical management functions on the data link layer [8]. While payload data can be encrypted, frame headers are A. Data Processing unencrypted and visible to anybody within radio range. Since the exchange of information on the data link layer is Before the communication patterns can be visualized, so critical for wireless network operations and because raw packet capture data must be processed and aggregated higher level information encapsulated in the frames is for efficiency. All of the information necessary to construct supposed to be encrypted, it is imperative that any analysis a “WiFi Flow” object is contained within the raw packet takes note of the frame headers that are captured. When it capture files. In addition, the data is aligned with other comes to wired networks, the data link layer serves a similar information that has already been processed by MeerCAT. purpose (carrying packets directly from device to device), This allows the visualization to be linked to the rest of the however monitoring communication flows through this system and allows the user to select information from layer proves to be tedious and redundant. Security analysts specific networks if they do not wish to only view a subset are often more concerned about what is occurring on the of the available data. network layer in order to understand which hosts are The data aggregation process is fairly simple, each communicating with each other. The source and destination packet is analyzed and any headers on the network or data are the primary concern as opposed to the details of the link layers that can be deciphered are extracted. Similar steps taken on the journey to the destination. packets are aggregated into a single WiFi flow object which Since data link layer frames are dropped from packets carries aggregated information regarding how many packets and replaced at every switch, it is impractical to associate a were sent as well as their total size. Start time and elapsed particular MAC address with an IP address unless data time of each communication flow are noted as well to give collection is happening directly on access switches. When analysts an idea of the period of time over which the we consider the typical topology of a wireless network, communication took place. When network (IP) layer there are typically several wireless devices that may information can be deciphered, the source and destination communicate with each other over the air but send all MAC addresses, IP addresses, and ports are used to create a exterior communications to a single end point (the access primary key that is used to aggregate packets which point or its controller). There is typically a one-to-one represent the same type of communication. When no relationship between an observed IP address and MAC network layer header is present or if it cannot be deciphered address within a packet, with the exception of the access due to encryption, only the source and destination MAC point which carries all traffic external to the wireless addresses are combined to create the primary key. network. Once the packet data has been aggregated, it is stored to Recognizing the significance of the data link layer to a database for later retrieval. When a user starts the wireless security and communication monitoring, we found MeerCAT system, they can select any subset of data which it essential to build a visualization that would recognize the they have imported and the WiFi Flows visualization will be attributes of both data link and network layer populated with communication patterns associated with the communications. To accomplish this, an algorithm was user’s selection. developed to process raw packet capture data into B. Visual Analytics aggregated “WiFi Flows”, each of which corresponds to GraphOver Magnifier view Filters Access Point Figure 1 Example WiFi Flows Graph. In situations that require analysis of large sets of raw The graph can be constructed using one of two different

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us