OpenSource For You

Wireless attack detection

-

Before we talk about protecting the infrastruc­tureI it is imperative to understand a few detection techniques. rnlike wired networksI a wireless network signal can be FRPSURPLsH­d HasLOy, wKLFK PaNHs dHWHFWLRn dLIfiFXOW EXW certainly not impossible.

AP monitoring: As wH OHaUnW, sHFXULng WKH SS,D of an Am or wireless router is very important. fn a large RUganLsaWL­Rn, NHHSLng WUaFN RI SS,Ds Fan EH a FKaOOHngH; henceI this informatio­n should be programmat­ically stored in a sHFXUH daWaEasH. 2WKHU FUXFLaO dHWaLOs, sXFK as WKH 0AC ,D, fm restrictio­nsI the wireless channel usedI the beacon settingsI wireless signal strength and bandwidth type are stored for HaFK FRUUHsSRnd­Lng SS,D. A wLUHOHss PRnLWRULng dHYLFH, or a mobile device running monitoring softwareI is used to detect all stations and Ams periodical­lyI and the results are compared with the baseline database created earlier. puch routine audits ensure the integrity of router settings and thus the overall wireless network security.

Wi-Fi node monitoring: Along with the AmsI each node needs to be monitored too. qhe technique is a bit differentI though. cor the nodesI a jAC-based security on the Ams Fan EH FRnfigXUHd, wKHUHEy a SaUWLFXOaU AP wRXOd sXSSRUW only a set of jAC addresses. qhis ensures that the wireless FOLHnW nRdH FannRW URaP aURXnd EHyRnd WKH FRnfigXUHd zRnH, and LI sXFK a nHHd aULsHs WKH UHTXHsW Fan EH IXOfiOOHd YLa an authorisat­ion and approval process. cor large organisati­onsI this can result in systems administra­tion overheadI in which case the nodes can be allowed to connect to all Ams; howeverI each connection and disconnect­ion can be logged and parsed for anomalous behaviour.

TraIfiF PoniWoring: Besides the above techniques­I network administra­tors can periodical­ly take samples of data from each AmI and check for denial of service and pvk

Newspapers in English

Newspapers from India