Wireless Intrusion Detection System
Wireless Intrusion Detection System
9
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.8, August 2010
2. WLAN STANDARDS
Most WLANs use the Institute of Electrical and Electronics
Engineers (IEEE) 802.11 family of WLAN standards. The most
commonly used WLAN radio transmission standards are IEEE FIGURE1: WIRELESS LAN ARCHITECTURE EXAMPLE
802.11b and IEEE 802.11g, which use the 2.4 gigahertz (GHz)
band, and IEEE 802.11a, which uses the 5 GHz band. IEEE
Some WLANs also use wireless switches. A wireless switch is a
802.11a, b, and g include security features known collectively as
device that acts as an intermediary between APs and the DS.
Wired Equivalent Privacy (WEP). Unfortunately, WEP has
several well-documented security problems. To overcome these,
IEEE 802.11i was created; it specifies security components that The IEEE 802.11 standard also defines the following two WLAN
work in conjunction with IEEE 802.11a, b, and g. architectures:
Ad Hoc Mode: The ad hoc mode does not use APs. Ad hoc
Another set of WLAN standards has been created by a non-profit
mode, also known as peer-to-peer mode, involves two or more
industry consortium of WLAN equipment and software vendors
STAs communicating directly with one another.
called the Wi-Fi Alliance. While IEEE was working on finalizing
the 802.11i standard, the Alliance created an interim solution
Infrastructure Mode: In infrastructure mode, an AP connects
called Wi-Fi Protected Access (WPA). Published in October
wireless STAs to a DS, typically a wired network.
2002, WPA is essentially a subset of the draft IEEE 802.11i
requirements available at that time. WPA provides stronger
security for WLAN communications than WEP. In conjunction 3.1 Typical Components
with the ratification of the IEEE 802.11i amendment, the Wi-Fi The typical components in a wireless IDS are consoles, database
Alliance introduced WPA2, its term for interoperable equipment servers (optional), management servers, and sensors.
that is capable of supporting IEEE 802.11i requirements. WPA2
offers stronger security controls than either WPA or WEP.
10
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.8, August 2010
A wireless IDS work by sampling traffic. There are two frequency Wireless switches are intended to assist administrators
bands to monitor (2.4 GHz and 5 GHz), and each band is with managing and monitoring wireless devices; some of these
separated into channels. It is not currently possible for a sensor to switches also offer some wireless IDS capabilities as a secondary
monitor all traffic on a band simultaneously; a sensor has to function. Wireless switches typically do not offer detection
monitor a single channel at a time. When the sensor is ready to capabilities as strong as bundled APs or dedicated sensors.
monitor a different channel, the sensor must shut its radio off,
change the channel, then turn its radio on. The longer a single Because dedicated sensors can focus on detection and do not need
channel is monitored, the more likely it is that the sensor will miss to carry wireless traffic, they typically offer stronger detection
malicious activity occurring on other channels. To avoid this, capabilities than wireless sensors bundled with APs or wireless
sensors typically change channels frequently, which is known as switches. However, dedicated sensors are often more expensive to
channel scanning, so that they can monitor each channel a few acquire, install, and maintain than bundled sensors because
times per second. To reduce or eliminate channel scanning, bundled sensors can be installed on existing hardware, whereas
specialized sensors are available that use several radios and high- dedicated sensors involve additional hardware and software.
power antennas, with each radio/antenna pair monitoring a Organizations should consider both security and cost when
different channel. Because of their higher sensitivities, the high- selecting wireless IDS sensors.
power antennas also have a larger monitoring range than regular
antennas. Some implementations coordinate scanning patterns Some vendors also have host-based wireless IDS sensor software
among sensors with overlapping ranges so that each sensor needs that can be installed on STAs, such as laptops. The sensor
to monitor fewer channels. software detects attacks within range of the STAs, as well as
misconfigurations of the STAs, and reports this information to
Wireless sensors are available in multiple forms: management servers. The sensor software may also be able to
enforce security policies on the STAs, such as limiting access to
3.1.1 Dedicated: wireless interfaces.
A dedicated sensor is a device that performs wireless
IDS functions but does not pass network traffic from source to 3.2 Network Architectures
destination. Dedicated sensors are often completely passive, Wireless IDS components are typically connected to each other
functioning in a radio frequency (RF) monitoring mode to sniff through a wired network. A separate management network or the
wireless network traffic. Some dedicated sensors perform analysis organization’s standard networks can be used for wireless IDS
of the traffic they monitor, while other sensors forward the component communications. Because there should already be a
network traffic to a management server for analysis. The sensor is strictly controlled separation between the wireless and wired
typically connected to the wired network (e.g., Ethernet cable networks, using either a management network or a standard
between the sensor and a switch). Dedicated sensors are usually network should be acceptable for wireless IDS components. Also,
designed for one of two deployment types: some wireless IDS sensors (particularly mobile ones) are used
Fixed—the sensor is deployed to a particular location. Such standalone and do not need wired network connectivity. (Refer
sensors are typically dependent on the organization’s Figure 2)
infrastructure (e.g., power, wired network). Fixed sensors are
usually appliance-based.
Mobile—the sensor is designed to be used while in motion. For
example, a security administrator could use a mobile sensor while
walking through an organization’s buildings and campus to find
rogue APs. Mobile sensors are either appliance-based or software-
based (e.g., software installed onto a laptop with a wireless NIC
capable of doing RF monitoring).
11
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.8, August 2010
12
International Journal of Computer Applications (0975 – 8887)
Volume 5– No.8, August 2010
network should be acceptable for wireless IDS components. WLANs require a number of other security measures to be
Choosing sensor locations for a wireless IDS deployment is a employed before an adequate level of security can be reached, but
fundamentally different problem than choosing locations for any the addition of a wireless IDS can greatly improve the security
other type of IDS sensor. posture of the entire network. With the immense rate of wireless
Compared to other forms of IDS, wireless IDS is generally more adoption, the ever-increasing number of threats to WLANs, and
accurate; this is largely due to its limited scope. the growing complexity of attacks, a system to identify and report
on threat information can greatly enhance the security of a
wireless network.
8. CONCLUSION
As with most new technologies, wireless has several 9. REFERENCES
vulnerabilities. It is important to note that absolute security is an
[1] Wireless Intrusion Detection Systems Including Incident
abstract concept – it does not exist anywhere. All networks are
Response & Wireless Policy, by Jeff Dixon.
vulnerable to insider or outsider attacks, and eavesdropping. No
http://www.infosecwriters.com/text_resources/pdf/Wireless_I
one wants to risk having the data exposed to the casual observer
DS_JDixon.pdf
or open malicious mischief.
[2] An Overview of the Wireless Intrusion Detection
System,byOliverPoblete.
Wireless IDS solutions are available from both the open-source
http://www.sans.org/reading_room/whitepapers/wireless/over
and commercial markets and both have their own advantages.
view-wireless-intrusion-detection-system_1599
Wireless intrusion detection systems are an important addition to
[3] Guide to Intrusion Detection and Prevention Systems (IDPS),
the security of wireless local area networks. With the capability to
NIST special publication 800-94, by Karen Scarfone
detect probes, DoSs, and variety of 802.11 attacks, in addition to
PeterMell
assistance with policy enforcement, the benefits of a wireless IDS
http://www.sans.org/reading_room/whitepapers/wireless/over
can be substantial. Of course, just as with a wired network, an IDS
view-wireless-intrusion-detection-system_1599
is only one part of a greater security solution.
[4] Wireless Intrusion Detection Systems, Security Articles, by
Jamil Farshchi
13