
30
Chapter 2: IDS—Denial of Service Attack
AirMagnet Laptop Wireless LAN Policy Reference Guide
AirMagnet Mobile can detect this Denial of Service attack that can
cause the wireless client to lose legitimate data. You can use the Find
tool to locate the source device and take appropriate steps to remove
it from the wireless environment.
Figure 2-4: Locating a device using AirMagnet Mobile FIND tool
DoS Attack: Unauthenticated Association
This form of denial-of-service attack attempts to exhaust the AP's
resources, particularly the client association table, by flooding the AP
with a large number of emulated and spoofed client associations. At
the 802.11 layer, Shared-key authentication is flawed and rarely used
any more. The only other alternative is Open authentication (null
authentication) that relies on higher-level authentication such as
802.1x or VPN. Open authentication allows any client to authenticate
and then associate. An attacker leveraging such a vulnerability can
emulate a large number of clients to flood a target AP's client
Laptop Wireless LAN Policy Reference Guide.book Page 30 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...