Post on 21-Jun-2015
description
transcript
By
Harpreet Singh(005788029)
Bhanu Chandra Namaniwar(005773911)
Advisor : Co-advisor:
Prof.Jalel Rejeb Prof. Morris Jones
Secure and
enhanced authentication in 802.1x wireless standard by:
T
oken Based Authentication
N
etwork Behavior Analysis
Addition of following in 802.1x : Hardware Tokens Network Behavior Analysis
Results : Hardware authentication Monitoring user’s activities
Which provides:Strong authentication as compared to
traditional 802.1x
Implement hardware authentication
Monitor and record client’s activities
Detect intrusion in the network
Detect anomaly in client’s behavior
Authentication server
client
Authenticator
client
Authenticator
Authentication server
unusual
usual
Improvement in 802.1x by
implementing:
Hardware authentication
Record and monitor client’s activity
Double authentication achievement
Study : 802.1x authentication standard framework Hardware tokens (eg:smart cards, USB sticks
etc.) Network Behavior Analysis tools(eg:flowmatrix,
wireshark, java programming tools etc.) Developing block diagram Implementing 802.1x network Adding hardware token based authentication Installing Network behavior analysis tools to
monitor and record client’s activity Final debugging Verification and comparison against traditional
802.1x Final report and presentation
Supplicant software
Authenticator configuration
Authentication server installation
E-trust identity guard mini token
Wireshark for traffic monitoring
Flowmatrix for recording and
analyzing
802.1x implementation on a simple network (2 weeks)
Study on hardware token devices (1 week)
Implementation of hardware token (1 week)
Study on NBA (2 weeks)
Problems resolving in token based authentication Implementation (1 week)
Implementation of NBA in network (2 weeks)
Problems resolving in NBA implementation (2 weeks)
Problems faced and resolving in overall project (1 week)
Project report ( 2 weeks)
1) Presentation on 802.1x Overview by Sudheer Nath. Cisco Systems2) Paper on 802.1x by Ronny Haryanto.3) Paper on 802.1x and PEAP by STEVE RILEY, Senior Consultant, MCS
Trustworthy computing services.4) How to Use Network Behavior Analysis Tools,
http://www.csoonline.com/article/458746/How_to_Use_Network_Behavior_Analysis_Tools
5) Li He, Shunzheng Yu, Min Li “Anomaly Detection Based on Available Bandwidth Estimation”2008.
6) Bin Zeng , Dafang Zhang , Wenwei Li , Gaogang Xie ,Guangxing Zhang “Design and Implementation of a Network Behavior Analysis-oriented IP
7) Network Measurement System” The 9th International Conference for Young Computer Scientists
8) M. A. CaturBhakti, A. Abdullah, and L. T.Jung “EAP-based Authentication with EAP Method Selection Mechanism”2007.
9) Kulkarni, U.; Vadavi, J.V.; Joshi, S.M.; Sekaran, K.C.; Yardi, A.R “Distributed Multi level Security token based Authentication for Ubiquitous Objects” 2006.
10) Vipin, M.; Sarad, A.V.; Sankar, K. “A Multi Way Tree for Token Based Authentication” 2008.
11) Shu Yun Lim, Andy Jones “Network Anomaly Detection System: The State of Art of Network Behaviour Analysis”,2008
QUESTIONS ?