
36
Chapter 2: IDS—Denial of Service Attack
AirMagnet Laptop Wireless LAN Policy Reference Guide
AirMagnet Mobile detects this specific DoS attack and sets off the
alarm. Please use the Find tool to locate the responsible device and
take appropriate steps to remove it from the wireless environment.
Figure 2-8: Locating a device using AirMagnet Mobile FIND tool
DoS Attack: RF Jamming Attack
WLAN reliability and efficiency depend on the quality of the RF
media. Be it 802.11b/g at 2.4GHz or 802.11a at the 5GHz RF
spectrum, they are all susceptible to RF noise impact. An attacker
leveraging this WLAN vulnerability can perform two types of DoS
attacks:
•
Disrupt WLAN service:
At the 2.4GHz unlicensed spectrum,
the attack may be unintentional. A cordless phone, Bluetooth
devices, microwave, wireless surveillance video camera, or
baby monitor can all emit RF energy to disrupt WLAN ser-
vice. Malicious attacks can manipulate the RF power at
2.4GHz or 5GHz spectrum with a high gain directional
antenna to amplify the attack impact from a distance. With
free-space and indoor attenuation, a one kilo-watt jammer
300 feet away from a building can jam 50 to 100 feet into the
Laptop Wireless LAN Policy Reference Guide.book Page 36 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...