Dartmouth Internet Security Testbed (DIST): building a campus-wide - - PowerPoint PPT Presentation

dartmouth internet security testbed dist building a
SMART_READER_LITE
LIVE PREVIEW

Dartmouth Internet Security Testbed (DIST): building a campus-wide - - PowerPoint PPT Presentation

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed Sergey Bratus David Kotz Keren Tan William Taylor Bennet Vance 1 Anna


slide-1
SLIDE 1

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Dartmouth Internet Security Testbed (DIST): building a campus-wide wireless testbed

Sergey Bratus David Kotz Keren Tan William Taylor Anna Shubina Bennet Vance1 Michael E. Locasto2

1Dartmouth College, Hanover, New Hampshire 2George Mason University, Fairfax, Virginia

2nd Workshop on Cyber Security Experimentation and Test, 2009

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-2
SLIDE 2

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-3
SLIDE 3

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-4
SLIDE 4

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

DIST Architecture and Operation

Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames

Aruba AP70 access points reflashed with OpenWRT firmware

DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-5
SLIDE 5

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

DIST Architecture and Operation

Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames

Aruba AP70 access points reflashed with OpenWRT firmware

DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-6
SLIDE 6

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

DIST Architecture and Operation

Covered in this talk: Dartmouth Internet Security Testbed (wireless) DIST wireless in short Over 200 wireless Air Monitors capturing 802.11 frames

Aruba AP70 access points reflashed with OpenWRT firmware

DIST servers processing the captured frames and storing sanitized data Launchpad, a DIST server that alone may launch experiments using the Air Monitors

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-7
SLIDE 7

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

DIST at a glance

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-8
SLIDE 8

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

DIST Architecture and Operation

Red arrows show sensitive traffic. Green arrows show frames that are encrypted or sanitized.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-9
SLIDE 9

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-10
SLIDE 10

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Data Protection and Sanitization

Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs?

  • Sanitization on AMs would be too CPU-intensive.
  • Sharing the sanitization key securely is hard.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-11
SLIDE 11

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Data Protection and Sanitization

Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs?

  • Sanitization on AMs would be too CPU-intensive.
  • Sharing the sanitization key securely is hard.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-12
SLIDE 12

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Data Protection and Sanitization

Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs?

  • Sanitization on AMs would be too CPU-intensive.
  • Sharing the sanitization key securely is hard.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-13
SLIDE 13

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Data Protection and Sanitization

Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs?

  • Sanitization on AMs would be too CPU-intensive.
  • Sharing the sanitization key securely is hard.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-14
SLIDE 14

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Data Protection and Sanitization

Why? “Human layers of the OSI networking model” We discard all but the MAC layer. We encrypt every packet before sending it to the server. The server sanitizes every 802.11 frame header just after decryption. Sanitization key is generated anew for every experiment, using a random seed, which is discarded after use. Why sanitize on the server, not on the AMs?

  • Sanitization on AMs would be too CPU-intensive.
  • Sharing the sanitization key securely is hard.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-15
SLIDE 15

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Encryption

Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers.

A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster.

Rabbit won on AP70s over other eStream ciphers and

  • SNOW2. (Perhaps due to optimized implementation.)

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-16
SLIDE 16

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Encryption

Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers.

A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster.

Rabbit won on AP70s over other eStream ciphers and

  • SNOW2. (Perhaps due to optimized implementation.)

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-17
SLIDE 17

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Encryption

Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers.

A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster.

Rabbit won on AP70s over other eStream ciphers and

  • SNOW2. (Perhaps due to optimized implementation.)

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-18
SLIDE 18

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Encryption

Task Encrypting a continuous stream of frames. Cipher Stream cipher Rabbit, optimized for the MIPS 4Kc processor. Stream ciphers vs block ciphers.

A block cipher is easier to attack by enumerating inputs. (This could be fatal for DIST’s easily predictable data) A stream cipher might be faster.

Rabbit won on AP70s over other eStream ciphers and

  • SNOW2. (Perhaps due to optimized implementation.)

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-19
SLIDE 19

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Effects of Compression

Task: Optimize the Air Monitors’ end-to-end throughput. Encryption + UDP forwarding 6.2–6.4 seconds for 5000 14K jumbo frames (each tens to hundreds of Radiotap and IEEE 802.11 headers). Compression + encryption + UDP forwarding 5.3–5.4 seconds for the same. The bandwidth is reduced by nearly 80%.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-20
SLIDE 20

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Sanitization

MAC addresses MAC addresses are not personally identifiable information by itself, but may become such if correlated with other data. DIST servers sanitize MAC addresses. In transit, MAC addresses are protected by encryption. Sanitization key generates pseudo-random numbers and exists only for the time of the process. ESSIDs 802.11 probe requests are a known privacy risk. The last known network’s probed ESSID may contain private information, such as the network owner’s name. DIST sanitizes ESSIDs that are not on Dartmouth whitelist.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-21
SLIDE 21

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities

Sanitization

MAC addresses MAC addresses are not personally identifiable information by itself, but may become such if correlated with other data. DIST servers sanitize MAC addresses. In transit, MAC addresses are protected by encryption. Sanitization key generates pseudo-random numbers and exists only for the time of the process. ESSIDs 802.11 probe requests are a known privacy risk. The last known network’s probed ESSID may contain private information, such as the network owner’s name. DIST sanitizes ESSIDs that are not on Dartmouth whitelist.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-22
SLIDE 22

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-23
SLIDE 23

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-24
SLIDE 24

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-25
SLIDE 25

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-26
SLIDE 26

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-27
SLIDE 27

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-28
SLIDE 28

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-29
SLIDE 29

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-30
SLIDE 30

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Harsh Realities

Convincing organizations

IT services permissions Risks of research involving human subjects, as seen by Institutional Review Board Convincing the College

Convincing humans

Privacy perceptions Aesthetics

Technical issues

Surviving network changes Power consumption issues Response time anomalies

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-31
SLIDE 31

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-32
SLIDE 32

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Convincing Organizations

IT services permission Easy at Dartmouth, due to collaboration with IT services. Institutional Review Board approval Research involving human subjects has to be approved by IRB, which operates in terms of medical research. Convincing the College DIST had to deal with concerns of the College administration and other on-campus organizations. DIST researchers explained the project to the concerned. College hired an external auditor to provide feedback. DIST added additional layers of security and developed a 20-page document explaining principles & procedures.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-33
SLIDE 33

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Convincing Organizations

IT services permission Easy at Dartmouth, due to collaboration with IT services. Institutional Review Board approval Research involving human subjects has to be approved by IRB, which operates in terms of medical research. Convincing the College DIST had to deal with concerns of the College administration and other on-campus organizations. DIST researchers explained the project to the concerned. College hired an external auditor to provide feedback. DIST added additional layers of security and developed a 20-page document explaining principles & procedures.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-34
SLIDE 34

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Convincing Organizations

IT services permission Easy at Dartmouth, due to collaboration with IT services. Institutional Review Board approval Research involving human subjects has to be approved by IRB, which operates in terms of medical research. Convincing the College DIST had to deal with concerns of the College administration and other on-campus organizations. DIST researchers explained the project to the concerned. College hired an external auditor to provide feedback. DIST added additional layers of security and developed a 20-page document explaining principles & procedures.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-35
SLIDE 35

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-36
SLIDE 36

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Privacy Perceptions

As well as convincing the College, the researchers had to convince building owners that DIST would not be a privacy risk. Some did not show concern. Librarians were sensitized due to new laws and afraid to upset various groups, in part due to their experiences with Patriot Act. In the end, trusted the researchers, relying on public announcements of DIST’s activities. Student center called, concerned with student reactions and ethics. Engineering school asked to come to give a public presentation about security and other technical issues.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-37
SLIDE 37

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Signage

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-38
SLIDE 38

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Aesthetics

Aesthetics was a much harder problem than researchers

  • expected. DIST deployment for an entire building had to be

cancelled for aesthetic reasons.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-39
SLIDE 39

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST wireless monitor vs an access point

A Kiewit access point An open-flap wireless monitor

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-40
SLIDE 40

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST wireless monitors

An open-flap wireless monitor A closed-flap wireless monitor

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-41
SLIDE 41

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Open-flap and closed-flap monitors, external antennas

Open-flap vs closed-flap Closed-flap wireless monitors are easier to place than

  • pen-flap. But:

The coverage of internal antennas is only 180 degrees, not 360 degrees. External antennas vs internal antennas External antennas are more powerful than internal. But: Internal antennas work better due to antenna diversity.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-42
SLIDE 42

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Open-flap and closed-flap monitors, external antennas

Open-flap vs closed-flap Closed-flap wireless monitors are easier to place than

  • pen-flap. But:

The coverage of internal antennas is only 180 degrees, not 360 degrees. External antennas vs internal antennas External antennas are more powerful than internal. But: Internal antennas work better due to antenna diversity.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-43
SLIDE 43

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Open-flap and closed-flap monitors, external antennas

Open-flap vs closed-flap Closed-flap wireless monitors are easier to place than

  • pen-flap. But:

The coverage of internal antennas is only 180 degrees, not 360 degrees. External antennas vs internal antennas External antennas are more powerful than internal. But: Internal antennas work better due to antenna diversity.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-44
SLIDE 44

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Open-flap and closed-flap monitors, external antennas

Open-flap vs closed-flap Closed-flap wireless monitors are easier to place than

  • pen-flap. But:

The coverage of internal antennas is only 180 degrees, not 360 degrees. External antennas vs internal antennas External antennas are more powerful than internal. But: Internal antennas work better due to antenna diversity.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-45
SLIDE 45

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Open-flap and closed-flap monitors, external antennas

Open-flap vs closed-flap Closed-flap wireless monitors are easier to place than

  • pen-flap. But:

The coverage of internal antennas is only 180 degrees, not 360 degrees. External antennas vs internal antennas External antennas are more powerful than internal. But: Internal antennas work better due to antenna diversity.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-46
SLIDE 46

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST monitors that did not make it

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-47
SLIDE 47

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST monitors that did not make it

The original complaint was aesthetics; the final problem was cost.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-48
SLIDE 48

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST monitors that did not make it

Not allowed for aesthetic reasons; placed in the corner to the right instead.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-49
SLIDE 49

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

DIST monitors that did not make it

Originally allowed if placed next to the other junk; then denied for aesthetic reasons.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-50
SLIDE 50

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Outline

1

DIST Architecture and Operation

2

Data Protection and Sanitization

3

Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-51
SLIDE 51

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Pesky Technical Issues

Surviving network changes Production networks - subnet allocations, VLANs, etc - will

  • change. At least one major change per year is a certainty.

Access points must be prepared to survive it. Power consumption issues Two ways to power air monitors: Power-over-Ethernet and external power supplies (unsightly). Power stability is essential. AP70s under OpenWRT tend to reboot on power variations. Response time anomalies AP70s sometimes take too long to respond to a packet, complicating auditing. Not always clear if it is the fault of AP70s

  • r an artefact of network configuration.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-52
SLIDE 52

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Pesky Technical Issues

Surviving network changes Production networks - subnet allocations, VLANs, etc - will

  • change. At least one major change per year is a certainty.

Access points must be prepared to survive it. Power consumption issues Two ways to power air monitors: Power-over-Ethernet and external power supplies (unsightly). Power stability is essential. AP70s under OpenWRT tend to reboot on power variations. Response time anomalies AP70s sometimes take too long to respond to a packet, complicating auditing. Not always clear if it is the fault of AP70s

  • r an artefact of network configuration.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-53
SLIDE 53

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Pesky Technical Issues

Surviving network changes Production networks - subnet allocations, VLANs, etc - will

  • change. At least one major change per year is a certainty.

Access points must be prepared to survive it. Power consumption issues Two ways to power air monitors: Power-over-Ethernet and external power supplies (unsightly). Power stability is essential. AP70s under OpenWRT tend to reboot on power variations. Response time anomalies AP70s sometimes take too long to respond to a packet, complicating auditing. Not always clear if it is the fault of AP70s

  • r an artefact of network configuration.

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)

slide-54
SLIDE 54

DIST Architecture and Operation Data Protection and Sanitization Harsh Realities Convincing Organizations Convincing Humans Technical Issues

Thank you! “There is never enough time. Thank you for yours!”

Bratus, Kotz, Tan, Taylor, Shubina, Vance, Locasto Dartmouth Internet Security Testbed (DIST)