148
Aruba AirOS
Part 0500036-02
v2.3 User Guide
January 2005
Denial of Service Detection
DoS attacks are designed to prevent or inhibit legitimate users from accessing the net-
work. This includes blocking network access completely, degrading network service, and
increasing processing load on clients and network equipment. Denial of Service attack
detection encompasses both rate analysis and detection of a specific DoS attack known as
FakeAP.
z
Rate Analysis:
Many DoS attacks flood an AP or multiple APs with 802.11 management
frames. These can include authenticate/associate frames, designed to fill up the associa-
tion table of an AP. Other management frame floods, such as probe request floods, can
consume excess processing power on the AP. The Aruba WLAN Switch can be config-
ured with the thresholds that indicate a DoS attack and can detect the same. Refer to the
Configuring Denial of Service attack detection
section for more details.
z
Fake AP:
FakeAP is a tool that was originally created to thwart wardrivers by flooding
beacon frames containing hundreds of different addresses. This would appear to a ward-
river as though there were hundreds of different APs in the area, thus concealing the real
AP. While the tool is still effective for this purpose, a newer purpose is to flood public
hotspots or enterprises with fake AP beacons to confuse legitimate users and to increase
the amount of processing client operating systems must do. Refer to the
Configuring
Denial of Service attack detection
section for more details.
Man-In-The-Middle Detection
A successful man-in-the-middle attack will insert an attacker into the data path between
the client and the AP. In such a position, the attacker can delete, add, or modify data, pro-
vided he has access to the encryption keys. Such an attack also enables other attacks that
can learn a user’s authentication credentials. Man-in-the-middle attacks often rely on a
number of different vulnerabilities.
z
Station disconnection:
Spoofed deauthenticate frames form the basis for most denial of
service attacks, as well as the basis for many other attacks such as man-in-the-middle. In a
station disconnection attack, an attacker spoofs the MAC address of either an active client
or an active AP. The attacker then sends
deauthenticate
frames to the target device, causing
it to lose its active association.
z
EAP Handshake analysis:
EAP (Extensible Authentication Protocol) is a component of
802.1x used for authentication. Some attacks, such as “ASLEAP” (used to attack Cisco
LEAP) send spoofed deauthenticate messages to clients in order to force the client to re-
authenticate multiple times. These attacks then capture the authentication frames for
offline analysis. EAP Handshake Analysis detects a client performing an abnormal num-
ber of authentication procedures and generates an alarm when this condition is detected.
Summary of Contents for AirOS v2.3
Page 10: ...x Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 28: ...18 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 42: ...32 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 76: ...66 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 92: ...82 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 107: ...Configuring the Captive Portal 97 Chapter 7...
Page 136: ...126 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 155: ...Configuring Virtual Private Networks 145 Chapter 9...
Page 156: ...146 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 199: ...System and Network Management 189 Chapter 11 5 Click Done to make the modification...
Page 212: ...202 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 246: ...236 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...
Page 254: ...244 Aruba AirOS Part 0500036 02 v2 3 User Guide January 2005...