
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 3: IDS—Security Penetration
83
AirMagnet detects a spoofed MAC address by following the IEEE
authorized OUI (vendor ID) and 802.11 frame sequence number
signature. An administrator or the wireless security analyst can use
AirMagnet Handheld or Laptop Analyzer to track down the
intruding device by following the signal strength displayed by the
AirMagnet Find tool illustrated below.
Figure 3-16: AirMagnet Find Tool Can Help Locating Intruding Device
Suspicious After-Hour Traffic Detected
One way to detect a wireless security penetration attempt is to
analyze wireless usage during a time in which there is not supposed
to be any wireless traffic (such as after business hours). AirMagnet
Mobile monitors traffic patterns against the office-hours configured
for this alarm to generate alerts when an abnormality is found.
Specific suspicious wireless usage tracked by AirMagnet Mobile
during after-office hours include the following:
• Client station initiating authentication or association requests
to the office WLAN, which may indicate a security breach
attempt.
• Wireless data traffic that may indicate suspicious downloads
or uploads over the wireless network.
Laptop Wireless LAN Policy Reference Guide.book Page 83 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...