
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 2: IDS—Denial of Service Attack
49
AirMagnet
Mobile
detects this form of DoS attack by detecting
spoofed disassociation frames and tracking client authentication and
association states. When the alarm is triggered, the AP under attack
will be identified. The WLAN security officer can log on to the AP to
check the current association table status or use the AirMagnet
Mobile
active Tools (Diagnostics, DHCP, Ping) to test the wireless
service provided by this AP.
DoS Attack: EAPOL-Logoff Attack
The IEEE 802.1x standard defines the authentication protocol using
EAP (Extensible Authentication Protocol) over LANs, or EAPOL. The
802.1x protocol starts with a EAPOL-Start frame to begin the
authentication transaction. At the end of an authenticated session
when a client station wishes to log off, the client station sends an
802.1x EAPOL-Logoff frame to terminate the session with the AP.
Figure 2-19: Attacker spoofs a 802.1x EAPOL-Logoff frame from the
legitimate client station to fool the AP in logging off the client.
Since the EAPOL-logoff frame is not authenticated, an attacker can
potentially spoof this frame, logging the user off the AP, thus
committing a DoS attack. While this client station is logged off from
the AP using the attacker's spoofed EAPOL-logoff frame, the client
station is actually unaware of it until it tries to communicate through
the WLAN later. Typically, the client station will discover the
disrupted connection status and re-associate and authenticate
automatically to regain the wireless connection. The attacker can
continuously transmit the spoofed EAPOL-Logoff frames to be
effective on this attack.
Laptop Wireless LAN Policy Reference Guide.book Page 49 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...