Aruba Networks announced it had contained over 8,000 attacks on its wireless networks by deploying government-ready MOVE architecture at Black Hat.
detected and contained more than 8,790 security events over the wireless
networks it deployed for the annual Black Hat security conference in Las Vegas,
the company said.
included "670 rogues, 191 AP flood attacks, 489 instances of AP spoofing,
579 instances of IP spoofing, 1,659 'Hotspotter' attacks and 1,799 'Block ACK'
attacks," Aruba said Aug. 11. Hotspotter refers to a tool used to create phony
access points with phishing pages to capture log-in credentials, launch
man-in-the-middle attacks and infect hosts. Block ACK is a type of
denial-of-service attack against wireless clients.
maintained three different wireless networks for Black Hat, including one WPA (WiFi
Protected Access) network, one PEAP (Protected Extensive Authentication
Protocol) network that required users to self-register and one EAP-TLS (Extensive
Authentication Protocol-Transportation Layer Security) network with Aruba's Mobile
Device Access Control built in for users with iOS devices. Signs listing the
correct network SSID (service set identifier) and the key necessary to access
the main PSK (pre-shared key) network were posted at regular intervals
throughout the conference. Users interested in the PEAP and EAP-TLS secured
networks had to accept certificates before getting network access.
scheme seemed to work very well in a hostile environment like Black Hat with no
pre-established trust in users or secure means to provision credentials,"
said Robbie Gill, an Aruba engineer.
controller was configured to block all spoofing attacks, and users were not
allowed to communicate with each other on the network to "protect them
from each other," Gill said.
network for the conference was based on the Aruba MOVE (Mobile Virtual
Enterprise) architecture. MOVE supports the Suite B cryptography developed by
the National Security Agency to secure sensitive information on commercial
communications products, making it possible to create a mobile infrastructure
that could be just as secure as wired networks, Patrick Guerin, CTO of Key
Management Systems, told eWEEK
agencies need a solution that combines commercial technology with stronger
underlying cryptographic algorithms," Guerin said.
working with highly sensitive or classified data will be able to use commercial
mobile devices, such as iPhones, iPads and Android devices, to securely access
classified networks through MOVE, Travis Howerton, CTO of the National Nuclear
Security Administrator, told eWEEK.
Suite B support, NNSA can deploy sensors in classified environments to collect
data and transmit them back to the agency securely, Howerton said. They
wouldn't have to have people make rounds to collect the data, which would
the National Security Agency, Suite B is based on the same AES algorithm as the
802.11i security built into wireless radio chips, but is also wrapped up in
multiple layers, much like a "combination lock," Guerin said.
Attackers trying to crack Suite B would have to break the digital signature,
AES encryption, SHA-secure hash and the Elliptical Curve Diffie-Helman cryptographic
algorithm all at once to be able to see the content being protected, he said.
support for classified environments is significant because it allows government
employees to use mobile devices to access both classified and unclassified
networks, Guerin said.
fingerprinting capabilities also yielded some interesting statistics on what
kinds of devices were being used on the wireless network at Black Hat. Apple
devices were the most prevalent at Black Hat, accounting for 43.3 percent of
all devices. Approximately 65 percent of Apple devices used were iOS devices,
such as the iPad or iPhone, while the remainder ran OS X, according to Aruba.
Linux users were the second most prevalent, with 35 percent, followed by Windows
devices at 21.8 percent.
attendees accessed the wireless network, with as many as 853 concurrent users,
Aruba said. While the majority of the attendees use the main PSK network, about
200 attendees used the PEAP or EAP-TLS secured network. More than 30 Aruba
AP-134 access points were deployed over 200,000 square feet in the Caesar's
Palace conference center.