차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/st-4.pdf · 2015-12-04 · •...

35
차세대 무선랜 보안 기술 권혁찬 (한국전자통신연구원)

Upload: others

Post on 01-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

차세대 무선랜 보안 기술

권혁찬 (한국전자통신연구원)

Page 2: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

발표순서

• WLAN 표준

• WLAN 보안 표준

• WIPS 기술 소개

• ETRI WIPS

Page 3: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WLAN 표준

Page 4: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WLAN 표준

Page 5: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WLAN 표준

• Speed & Security

☞ Speed(Throughput) : 수십Mbps 수Gbps급

(1997) 802.11

(2004) 802.11i

(2009) 802.11w

(1999) 802.11b/a

2.4GHz/5GHz, 11~54Mbps

(2011) 802.11u/s

(2013) 802.11ai

(2003) 802.11g

2.4GHz, 54Mbps

(2010) 802.11n

2.4GHz/5GHz,150-600Mbps

(2012) 802.11ac/ad

5GHz/60GHz, 1~2Gbps

(2008) 802.11r

Page 6: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WLAN 보안 표준

Page 7: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WLAN 보안 표준

• 802.11i (MAC security enhancement) – Data privacy : TKIP & CCMP

• 802.11w (Protected Management Frame) – BIP(Broadcast/Multicast Integrity Protocol) protocol

• 802.11r (Fast BSS Transition) – initial mobility domain assoc., reassociation, resource

request – FT protocol authentication – FT security

• 802.11s (Mesh network) – SAE(Simultaneous Authentication of Equals) : Peer

authentication method – AMPE(Authenticated mesh peering exchange)

• …802.11u (roaming),

Page 8: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.11 security

RSNA: Robust Security Network Association

802.11 security

Pre-RSNA

Confidentiality

WEP

Authentication

Open system (none)

Shared Key

RSNA

Confidentiality & Integrity

TKIP

CCMP

BIP

Access Control

802.1x

Authentication &

Key Generation

EAP

IEEE

+ 802.11ai

Page 9: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.1x

• Port-Based Network Access Control -- IEEE std 802.1X-2004 – NETWORK standard, not a wireless standard

• 802.1X Entity – Authenticator: enforces authentication

– Supplicant: requests access to services accessible using the authenticator

– Authentication server

• 4-Way Handshake or FT 4-Way Handshake

Authentication Server

(RADIUS or Diameter)

Supplicant (STA)

EAPOL(EAP Over LAN)

Authenticator (AP)

Controlled port

Supplicant PAE

Authenticator PAE

LAN

Services offered by authenticator

Uncontrolled port

EAP Re-encapsulated by RADIUS (EAP carried in higher-layer protocol)

Page 10: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.1x - EAPOL

• Etensible Authentication Protocol over LANs

• EAPOL Packet Type

Protocol Version (1octet)

Packet Type (1octet)

Packet Body Length (2octet)

Packet Body ( ? )

Depends on EAP packet type

– EAPOL-EAP

– EAPOL-Start

– EAPOL-Logoff

– EAPOL-Key

– …

(EAPOL-EAP)

(EAPOL-Key)

Page 11: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

EAP(Extensible Authentication Protocol )

IETF RFC3748

EAP is an authentication framework, not a specific authentication mechanism

All EAP methods used by a PAE shall support mutual authentication

EAP frame Types

– Request

– Response

– Success

– Failure

– Initiate/Finish (for ERP, RFC5296)

11

EAP Request/Response Format

http://www.securityskeptic.com/CH07-1.html * ERP : EAP Re-authentication Protocol

Page 12: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.1X authentication

EAPOL(EAP-Request/Identity)

EAPOL(EAP-Response/Identity)

RADIUS-access-request

STA

무선접속 구간 (802.1x with

EAPOL)

EAPOL(EAP success)

RADIUS-access-accept (with PMK)

Derive Pairwise Master Key(PMK)

EAP type specific mutual authentication (multi-round message exchange)

Derive Pairwise Master Key(PMK)

EAPOL-Start

유선접속 구간 (RADIUS)

Access Point Authentication Server

End-to-End EAP exchange

Page 13: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.1X authentication - example

• Authenticator-initiated EAP-TLS (success)

End-to-End EAP exchange

Page 14: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

EAP methods

EAP-MD5

– ID/PWD 기반의 단방향 인증 (unsafe)

EAP-TLS

– PKI 기반의 강력한 인증 수단 (safe)

– TLS handshake을 이용한 상호 인증

EAP-TTLS (Tunneled TLS)

– TLS handshaking을 이용하여 종단간 보안 연결을 설정한 이후, EAP 또는 다른 프로토콜(MSCHAPv2)을 이용하여 부가적인 인증을 수행

PEAP(Protected EAP)

– EAP-TTLS와 유사, EAP 인증(EAP-MSCHAPv2, EAP-GTC 등)만을 허용

EAP-SIM, EAP-AKA, EAP-FAST, …

LEAP(Lightweight Extensible Authentication Protocol)

– 시스코에서 개발

MD5 TLS TTLS PEAP SIM

EAP

MS

CH

AP

v2

EA

P

EA

P

...

Page 15: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.11 assoc./auth. Procedure (example)

AP STA-A Auth. Server

2. 802.11 Probe Response

3. 802.11 open system authentication request

5. 802.11 association request

7. 802.1X authentication

8. 4-way handshake

9. Group key handshake

10. User Data Encryption with CCMP or TKIP

1. 802.11 Probe Request

4. 802.11 open system authentication response

6. 802.11 association response

RADIUS message with EAP

Install PMK

RADIUS setup with security

~ ~ ~ ~

IGTK is re-distributed

by GTK

STA-B

GTK & IGTK

PMK

GTK & IGTK

Page 16: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

802.11ai New TG at Jan. 2011 complete at Dec. 2014

FILS(Fast Initial Link Setup) – reduce initial association time to allow fast connection and

data transfer in situations where users are very dense and highly mobile

– Goal

• Build a secure, fast initial authentication that

– a) is suitable for users experiencing a small dwell time in a cell (due to high mobility or small cell sizes users)

– b) scales for large number of simultaneously occurring initial authentications

– begin to develop first draft

AP

AP

STA

DHCP Server

AS

Router

Internet

5 M

ove

in W

iFi E

SS

11r Interface

Reduce message rounds

Page 17: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

FILS concepts

APnAP2AP1

Beacon

STANetwork Elements

e.g., Router, HA, AAA,

AS, RADIUS

…...

Probe Request

Probe Response

Optimized AP Discovery:

-- multiple optimization variants to find a right

AP in the range; with / without pre-acquired

knowledge;

-- negotiation of customized post-AP-Discovery

link setup procedure

Additional Time Sync

Function (TSF)

Additional Time Sync Fun.

-- can be skipped

Authentication:

-- should be skipped or optmized. Authentication

AssociationAssociation:

-- skipped or optimized; varies

with different optimizations.

802.1x Security setup

(Maintain RSNA’s

security level )

IP address assignment

Upcoming STA info

Next AP info

Next

AP info

Upcoming

STA infoPre-acquire Knowledge: at AP and/or STA

-- can be from previously connected

network, e.g., 3G, other WiFi AP, etc.

-- can also be from STA’s memory and

current location, etc.;

not count as TGai link setup time!

Network Discovery

…...

…...

Network Discovery:

-- can be skipped.

Security Setup:

-- could have various

optimizations, depending the

available pre-acquired knowledge

IP address assignment:

-- can be optimized, skipped, or

combined with previous steps.

Post-AP-

Discovery

Link Setup

functions:

-- multiple

variants of

optimizations;

-- a selection of

specific

procedure will

be signaled

between AP

and STA.

Page 18: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WPA & WPA2 – WI-FI Alliance

Wi-Fi Alliance

WPA & WPA2

WPA

WPA2-Enterprise

WPA2-personal

WPA2

Wi-Fi의 상호운용성(Interoperability)을 인증하는 비영리 단체 http://www.wi-fi.org/

Page 19: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WPA & WPA2

• WPA(Wi-Fi Protected Access), WPA2

– WLAN 보안 기능을 제공하는 장비 인증을 보안 표준(802.11i) 완료 전에 시작하기 위해 정의한 Wi-Fi Alliance 자체 규격

• Wi-Fi CERTIFIED Program Timeline

Wi-Fi CERTIFIED program launched, with support for WEP 2000.4

WPA introduced with: • IEEE 802.1X authentication, TKIP, EAP-TLS

2003.4

WPA mandatory for all Wi-Fi CERTIFIED equipment 2003.9

WPA2 introduced with: • IEEE 802.1X authentication, CCMP, EAP-TLS

2004.9

Support for 4 additional EAP-types added: • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC,

EAP-SIM 2005 .4

WPA2 mandatory for all Wi-Fi CERTIFIED equipment 2006.3

Support for EAP-AKA and EAP-FAST added 2009.5

Support for Protected Management Frames added to WPA2 2012.1

802.11i completed (2004.6)

802.11w completed (2009.9)

Page 20: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WPA2-Enterprise vs. WPA2-Personal

Page 21: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS

Page 22: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

Wireless Attack Tools

Tool Name Description Type of Attack

AirSnort, AirCrack WEP/WPA cracker Encryption Cracker

Ettercap, dsniff, Wireshark Packet sniffers with traffic analysis Packet sniffing

Hotspotter, APsniff, APhunter, KNSGEM

Discovers WLANs by listening for beacon signals transmitted from APs

AP locator

HermesAP, OpenAP Used to setup an honeypot AP Evil Twin

OpenWRT, HyperWRT Replacement firmware so APs can be programmed to execute attacks.

Soft AP

AirJack , Simple-replay Allows previously captured packets to be injected back into the network.

Packet replay

FakeAP Generate thousands of 802.11 beacon signals. DoS Attack

Void11 Can be used to execute deauthenticate, authenticate, and association flooding attack.

DoS Attack

RF jammer (commercial tools)

Jams the RF signal so that it cannot be distinguished by a legitimate device

RF jamming

http://www.cse.wustl.edu/~jain/cse571-07/ftp/wireless_hacking/index.html#24b

Page 23: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS – attack 분류

Attack Description

Mis-configured AP 인가 AP 보안 설정(SSID/Channel 변경 등) 이상

Unregistered STA and AP Unauthorized association or Client Mis-association

Ad Hoc connection STA 의 에드혹 모드 동작

Rogue AP 비인가 AP

Wireless DoS Deauth., Disassoc., RTS/CTS, EAPOL flood

Honeypot AP(Evil Twin) 등록 AP의 SSID로 위장

MAC spoofing 인가 AP/STA의 MAC으로 위장

Data Encryption crack Active WEP/WPA crack, use weak IV

Mis-behaving client 회사 정책에 위배되는 단말 (soft AP, virtual AP)

Page 24: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS Concepts

STA

Attacker

WIPS Sensor

Enterprise Servers WIPS

Appliance Switch

AP

Wireless Coverage

Wired IPS

Internet

Passive collection

Active testing & counter-measures

AP

AP

Channel Monitoring

Page 25: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS Concepts

Page 26: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS - Channel Monitoring

무선브릿징을 위한 AP외에 L2 신호를 감시하는

WIPS sensor를 두는 형태

802.11 MAC 프레임(L2 무선 신호) 스캐닝하여 데이터 수집

– MAC Frame(control,

management, data frame) 감시

WIPS Sensor

Page 27: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

무선랜 PHY/MAC : – 802.11b/g: 2.4GHz (2.412 ~ 2.484, 11M~54Mbps)

– 802.11a: 5GHz (4.92 ~ 5.765, 54Mbps)

– 802.11n: 2.4GHz and 5GHz (150M~ 600Mbps)

• MIMO(Multi-Input Multi-Output)

• Channel bonding/Data aggregation

• # Channel : 52개 이상

– - 802.11ac : 5GHz/60GHz (1~2Gbps)

– …..

채널 감시 스케줄러 – 다채널 감시

– 트래픽/채널 본딩

Page 28: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

WIPS -Intrusion countermeasures

해당 STA와 AP의 정보를 도용(Spoofing)하여 De-Auth. Msg.를 전송

STA와 AP는 정상적인 데이터로 인지한 후 De-Authentication로 해당 세션의 종료(Kill) 유도

Authentication failure with L2 management frame

Reason Code Meaning

0 Reserved

1 Unspecified Reason

2 Previous authentication no longer valid

3 Deauthenticated because sending station is leaving (or has left) IBSS or ES

S

4 Disassociated due to inactivity

5 Disassociated because AP is unable to handle all currently associated statio

ns

6 Class 2 frame received from nonauthenticated station

7 Class 3 frame received from nonassociated station

8 Disassociated because sending station is leaving (or has left) BSS

9 Station requesting (re)association is not authenticated with responding stati

on

STA

WIPS Sensor

De-authentication (Reason Code 2) from STA AP

Page 29: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

Port blocking with ARP poisoning attack

ARP(Address Resolution Protocol) : L3 IP주소는 최종 전송을 위해서는 L2 MAC주소로 변환되어야 하며, 이때 MAC주소와 IP주소를 변환하는 프로토콜

단말에 저장된 ARP cache table을 수정하도록 하는 APR req. 를 전송하여 IP에 맵핑된 MAC 주소가 변경되도록 함으로써, 사용자 데이터 서비스를 불가하게 함

STA

WIPS Sensor AP(switch)

IP [10.0.0.3] MAC [cc:cc:cc:cc:cc:cc] ?

IP [10.0.0.3] MAC [xx:xx:xx:xxx:xx]

Page 30: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

ETRI WIPS

Page 31: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

ETRI WIPS 기술특징 주요 내용

무선침해방지센서(WSAS)

• 무선랜 침해방지 센서 감시/탐지/실시간 차단 기술

• 스마트 채널 스케쥴링 및 실시간 공격 단말 차단 기능

• 무선랜 디바이스 식별을 위한 무선지문용 특성 정보

추출 및 모델링, 알고리즘

무선침해방지센서 엔진 V1.0

• 무선 침해공격 탐지 및 실시간 차단 기능 구현

• 802.11w 기반 무선관리 프레임 보호 및 DoS 공격 대

응 기능

• Rogue 장치 탐색 및 분류를 통한 위협 탐지 차단 기능

• 유무선 트래픽 탐지 차단 기능

무선보안위협관리서버(WMSS)

• 유무선 통합보안 관제, 연결성 정보 기반 위협 탐지/대

응, 대량 메시지 처리 기능

• “무선 침해 방지 시스템과 모바일 디바이스 관리 시스

템간의 정보공유 프레임워크” - 국내 표준 및 특허

실시간 무선보안위협관리서버 모듈

V1.0

• 실시간 차단 등 위협 제어 기능, 센서 및 보안정책 관

리 기능 구현

• 센서/서버 인터페이스 기능 검증용 Traffic generator

구현

• 불법 단말/AP 위치 추적을 위한 위치 추정 알고리즘

연구

보안AP 플랫폼 및 무선랜 보안 응용서

비스 핵심모듈

• 보안 AP 플랫폼(HW) 및 보안 AP용 악성트래픽 탐지/차단 모듈(SW)

• ERP 키관리 및 보안 프로토콜 모듈 프로토타이핑 등 단말 AP 인증서버

※ ERP : Enterprise Resource Planning

※ AP : Access Point

Page 32: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

(특징 1) 무선핑거프린트 기반 불법복제 AP 실시간 탐지

유사도 32 % 복제 유사도 : 98% 정상

< 유사도 추이(평균) 그래프 >

AP

불법AP

무선 DoS

WIPS Sensor

위협탐지/ 접속차단 등 대응

다채널 감시

MAC주소 불법복제AP

무선피슁 (개인정보유출)

불법 단말

위치 추적

무선랜 프레임 및 무선핑거프린트 수집/분석

MAC

불법단말 식별

WIPS Server

<복제된 불법AP vs. 정상 AP>

AP/단말이 지니고 있는 고유의 기기 특성 등을 이용하여, 복제 불법 AP를 정교하게 탐지하여 사용을 차단 - 무선랜 이용을 제한하여야 하는 정부, 공공기관, 기업체 등에서 활용

Page 33: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

참고: 무선 핑거프린트

, where

Q

I

Phase

Error

Error

Vector E.V.M.(Error Vector Magnitude)

= |Error Vector|IQmeas

IQref(ideal)

ErrQ

ErrI

MAC spoofing device

Authorized device

Signature matching degree : 13%

Signature matching degree : 79%

Page 34: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

(특징 2) 무선랜 핫스팟용 신뢰기반 안심 AP접속 앱 (스마트폰 무선 피슁방지)

3.

GPS좌표, MAC주소 등 을 이용한 주위 신뢰 AP 탐색/분류 - 공공용/이동통신사 핫스팟 와이파이의 단말 접속 SW에 활용

... Hash-based Filter

… 1 0 0 1 0 1 1 1 0 0 … … 0 0 1 1 1 0 0 0 1 0 …

… … 0 1 0 1 1 1 0 0 1 0 …

… … … …

신뢰AP 해시정보

n : 단말이 찾은 모든 AP 갯수

필터 크기

Resu

lt

!!

위장 AP 정상 AP

어느 AP로 접속 ? ?

공격 시나리오 (Honeypot 기반 Rogue AP 공격)

: 잘 알려진 SSID(이통사, 스타벅스 등)로 위장하여 사용자 유인 대응의 어려움

: 불과 수십분의 공격만으로 개인정보 유출 가능 : 무료 와이파이의 서비스 지역이 넓어 침해방지센서 활용불가 : 실제 서비스 지역이 아니더라도, 소비자는 서비스 지역으로 착각할 수 있음

: 정상AP 정보(위치, SSID 등)를 압축 저장하여 단말 앱에서 신뢰도 판단, 신뢰 AP에 우선접속

우수성 : A-GPS 등 Geolocation 정보 활용하여 정확도 개선 : 안드로이드 기반 앱(SW) , 직관적인 신뢰AP 판단 : 신뢰 AP 정보 다운로드 및 직접 등록 가능

Page 35: 차세대 무선랜 보안 기술concert.or.kr/suf2015/pdf/ST-4.pdf · 2015-12-04 · • EAP-TTLS/MSCHAPv2, PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, EAP-SIM 2005 .4 WPA2 mandatory for

New security issue

WiFi Network Hopping을 통한 Malware 전파 시뮬레이션

유무선 공유기 해킹, 좀비화