
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 2: IDS—Denial of Service Attack
35
Mark Looi, Christian Wullems, Kevin Tham and Jason Smith from
the Information Security Research Centre, Queensland University of
Technology, Brisbane, Australia, have recently discovered a flaw in
the 802.11b protocol standard that could potentially make it
vulnerable to Denial of Service RF Jamming attacks.
This attack specifically attacks the CCA functionality. According to
the AusCERT bulletin, “an attack against this vulnerability exploits
the CCA function at the physical layer and causes all WLAN nodes
within range, both clients and access points (AP), to defer
transmission of data for the duration of the attack. When under
attack, the device behaves as if the channel is always busy,
preventing the transmission of any data over the wireless network.”
This DoS attack affects DSSS WLAN devices including IEEE 802.11,
802.11b and low-speed (below 20Mbps) 802.11g wireless devices.
IEEE 802.11a (using OFDM), high-speed (above 20Mbps using
OFDM) 802.11g wireless devices are not affected by this specific
attack. Also not affected are devices that use FHSS.
Any attacker using a PDA or a laptop equipped with a WLAN card
can launch such an attack on SOHO and enterprise WLANs. The only
solution or known protection against such an attack is switching to
the 802.11a protocol.
For more information on this DoS attack please refer to:
•
www.isi.qut.edu.au/
•
http://www.auscert.org.au/render.html?it=4091
•
http://www.kb.cert.org/vuls/id/106678
Laptop Wireless LAN Policy Reference Guide.book Page 35 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...