You are on page 1of 54

Advanced Wireless Network Security

Dr. Zafar Iqbal


Assistant Professor

PhD Cyber Security – National University of Science and Technology


Researcher – R&D
Team Lead – Cyber Security Lab MCS, NUST
Visiting Faculty – MCS, NUST
2
Advanced Cyber Attacks

Advanced Employ zero day malwares, multiphase

Cyber Threat Intelligence is a new paradigm for APTs management.

Persistent Targeted attacks

What is Cyber Threat Intelligence (CTI)?

Stealthy Remains undetected

3
o The ability to learn from experience.

o The ability to understand causes of things and accordingly solve the problem.

Intelligence ?

o The ability to acquire, understand, and use knowledge.

4
Daily Life Analogy

5
November 21, 2019

https://www.arabnews.pk/node/1587556/pakistan
6
The Art of War . . .

Knowing himself? Knowing enemy?

7
Knowing himself. . .
Perimeter Router
Device Hardening

Intranet Router Web Server HIPS

Device Hardening FW DMZ FW


FW
Core Switch

Access Switch IPS

FW/IPS Network DLP


AV Device Hardening
DLP Switch
AV
DLP SIEM/SOC
(Security
AV HIPS Management)
HIPS HIPS Application Server
DLP DB Server
8
Workstations DB Security FileDLP
Server 8
Knowing Enemy . . .

9
2019 - Pegasus for Android: the other side of the story emerges (lookout.com)
2020 Lookout, Inc. is a US-based company

2016
2017

lookout-pegasus-technical-analysis.pdf
10
4
1

3
2

11
5
8

What
Cyber are all
Threat these?
Intelligence

6
7

12
5
8

What
Cyber are all
Threat these?
Intelligence

6
7

13
What is CTI?

Cyber threat intelligence is the end result of cyber threat analysis.

It is a collection of finding

that can be used to take action and defend against threats.

14
Name
Belongs From
FYP

15
Block Diagram of Digital Communication

16
Mobile Adhoc Networks

17
Drone
Swarm

18
Autonomous Vehicles

19
20
Communcation

Main purpose of communication is to transfer information from a


source to a Destination via a medium.

Basic block diagram of a communication system:

21
Types of Commnication System

• Public Switched Telephone Network


• Satellite systems
• Radio,
• TV broadcasting
• Cellular phones
• Computer networks (LANs, WANs,
WLANs)
• Radars/EW (ECM, ECCM)

22
Types of Commnication System

Signals can be analog or digital.

Analog signals can have an infinite number of values in


a range.

Digital signals can have only a limited number of


values.

23
Digital Signals

• One with two signal levels


• Other with four signal levels

24
Types of Communication

• Analog systems convert analog message into signals that can propagate
through the channel.

25
Types of Communication

• Digital systems convert bits(digits, symbols) into signals

• Computers naturally generate information as characters/bits

• Most information can be converted into bits

• Analog signals converted to bits by sampling and quantizing (A/D conversion)

26
Why Digital?

• Good processing techniques are available for digital signals, such as:

• Data compression (or source coding)

• Error Correction (or channel coding)

• Equalization

• Security

27
Block Diagram of Digital Communication

28
Computer Networks – How Information flows from
Source to Destination

29
OSI Model

30
OSI Model

31
TCP/ IP
Stack

32
TCP/ IP Stack

33
TCP/ IP Stack Adresses

34
Encapsulation

Application data GET / HTML/1.1

Source Port | Destination Port Payload


TCP Segment > 1024 | 80

IP Packet
Source IP | Destination IP Payload
202.125.157.150 | 79.140.80.57
MAC Frame

Source MAC address | Destination MAC address Payload FCS


23:34:aa:bb:cc:dd | 12:34:aa:bb:cc:dd

35
TCP/ IP Stack – End to End Communication

36
TCP/ IP Stack – End to End Communication

37
Formatting/ Source Coding

Transforms source info into digital symbols (digitization)

38
Modulation/ Demodulation

Demodulation reverses
Modulation is the process
the process of
of modifying the info
modulation. It involves
signal to facilitate
the detection and
transmission
retrieval of the info signal

39
Modulation/ Demodulation

40
Modulation/ Demodulation

41
Channel Coding

42
Multiplexing

43
Multiple Access

44
Radio Spectrum

45
Radio Spectrum Monitoring

46
Cellular Frequency Assignment

47
Radio Spectrum Monitoring

Pakistan Table of Frequency Allocations (pta.gov.pk)

48
General Course Info

Course Code: SY 625

Course Title: Advanced Wireless Network Security

Credit: 3

Pre-requisite: None

Class timing: 4:40 p.m. to 7:30 p.m. (Friday)

GCR Code : jhfwc4k

49
Reference Books

• Wireless and Mobile Network Security by Hakima Chaouchi and Maryline Laurent-
Maknavicius,

• Stallings W. (2017). Cryptography and Network Security, Principles and Practices, 7th
Edition, Pearson Education.

• Digital Communication By Sklar

• Online Material

50
Policies

• Attendance Policy: Attendance in all lectures is mandatory.

• Class participation is highly encouraged.

• Plagiarism: Turintin will be used for submitted assignments. So be careful.

51
Marks Distribution

• Quizzes 5%

• Assignments 10%

• Class Participation 5%

• Project/ Case Study 10%

• Mid Term 25%

• Final Term 45%

52
Research Article and Marks Distribution

Task Week Weightage


• Topic title with motivation (1 page) 3 5%
• Literature Review (15 Papers – 2 pages) 6 20%
• Proposed Solution (Flow Diagram ) 8 15%
• Implementation/ Framework (Pseudo code ) 10 25%
• Evaluation (Comparison with other solutions) 12 20%
• Conclusion and Future work 12 5%
• Latex + Visio 12 5%
• Presentation 13 5%

53
54

Thank you !

You might also like