
40
Chapter 2: IDS—Denial of Service Attack
AirMagnet Laptop Wireless LAN Policy Reference Guide
DoS Attack Against Client Station
Denial-of-Service attacks against wireless client stations are typically
carried out based upon the fact that 802.11 management frames and
802.1x authentication protocols have no encryption mechanism and
can therefore be spoofed. For example, wireless intruders can disrupt
the service to a client station by continuously spoofing a 802.11 dis-
association or de-authentication frame from the AP to the client
station. The 802.11 association state machine as specified by the IEEE
standard is illustrated below to show how an associated station can
be tricked out of the authenticated and associated state by various
types of spoofed frames.
Figure 2-12: 802.11 Association and Authentication State Machine
Besides the 802.11 authentication and association state attack, there
are similar attack scenarios for 802.1x authentication. For example,
802.1x EAP-Failure or EAP-logoff messages are not encrypted and
can be spoofed to disrupt the 802.1x authenticated state, thus
disrupting wireless service. See the diagram below for 802.1x
authentication and key exchange state change.
Laptop Wireless LAN Policy Reference Guide.book Page 40 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...