Wireless intrusion prevention system
   HOME

TheInfoList



OR:

In
computing Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and development of both hardware and software. Computing has scientific, ...
, a wireless intrusion prevention system (WIPS) is a
network Network, networking and networked may refer to: Science and technology * Network theory, the study of graphs as a representation of relations between discrete objects * Network science, an academic field that studies complex networks Mathematics ...
device that monitors the
radio spectrum The radio spectrum is the part of the electromagnetic spectrum with frequencies from 0  Hz to 3,000 GHz (3  THz). Electromagnetic waves in this frequency range, called radio waves, are widely used in modern technology, particula ...
for the presence of unauthorized access points ''(intrusion detection)'', and can automatically take countermeasures ''(intrusion prevention)''.


Purpose

The primary purpose of a WIPS is to prevent unauthorized network access to
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
s and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing
Wireless LAN A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office buildi ...
infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wireless infrastructure has integrated WIPS capabilities. Large organizations with many employees are particularly vulnerable to security breaches caused by rogue access points. If an employee (trusted entity) in a location brings in an easily available
wireless router A wireless router is a device that performs the functions of a router and also includes the functions of a wireless access point. It is used to provide access to the Internet or a private computer network. Depending on the manufacturer and mode ...
, the entire network can be exposed to anyone within range of the signals. In July 2009, th
PCI Security Standards Council
published wireless guidelines for
PCI DSS The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard used to handle credit cards from major card scheme, card brands. The standard is administered by the Payment Card Industry Security Standards Council a ...
recommending the use of WIPS to automate wireless scanning for large organizations.


Intrusion detection

A wireless
intrusion detection An intrusion detection system (IDS; also intrusion prevention system or IPS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically rep ...
system (WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a systems administrator whenever a rogue access point is detected. Conventionally it is achieved by comparing the
MAC address A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in most IEEE 802 networking tec ...
of the participating wireless devices. Rogue devices can spoof MAC address of an authorized network device as their own. New research uses
fingerprinting A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
approach to weed out devices with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against the known signatures of pre-authorized, known wireless devices.


Intrusion prevention

In addition to intrusion detection, a WIPS also includes features that prevent against the threat ''automatically''. For automatic prevention, it is required that the WIPS is able to accurately detect and automatically classify a threat. The following types of threats can be prevented by a good WIPS: * Rogue access points – WIPS should understand the difference between rogue APs and external (neighbor's) APs * Mis-configured AP * Client mis-association * Unauthorized association *
Man-in-the-middle attack In cryptography and computer security, a man-in-the-middle, monster-in-the-middle, machine-in-the-middle, monkey-in-the-middle, meddler-in-the-middle, manipulator-in-the-middle (MITM), person-in-the-middle (PITM) or adversary-in-the-middle (AiTM) ...
* ''Ad hoc'' networks * MAC spoofing * Honeypot / evil twin attack *
Denial-of-service attack In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host conn ...


Implementation

WIPS configurations consist of three components: *Sensors — These devices contain antennas and radios that scan the wireless spectrum for packets and are installed throughout areas to be protected *Server — The WIPS server centrally analyzes packets captured by sensors *Console — The console provides the primary user interface into the system for administration and reporting A simple intrusion detection system can be a single computer, connected to a wireless signal processing device, and antennas placed throughout the facility. For huge organizations, a Multi Network Controller provides central control of multiple WIPS servers, while for
SOHO Soho is an area of the City of Westminster, part of the West End of London. Originally a fashionable district for the aristocracy, it has been one of the main entertainment districts in the capital since the 19th century. The area was develo ...
or SMB customers, all the functionality of WIPS is available in single box. In a WIPS implementation, users first define the operating wireless policies in the WIPS. The WIPS sensors then analyze the traffic in the air and send this information to WIPS server. The WIPS server correlates the information, validates it against the defined policies, and classifies if it is a threat. The administrator of the WIPS is then notified of the threat, or, if a policy has been set accordingly, the WIPS takes automatic protection measures. WIPS is configured as either a network implementation or a hosted implementation.


Network implementation

In a network WIPS implementation, server, sensors and the console are all placed inside a private network and are not accessible from the Internet. Sensors communicate with the server over a private network using a private port. Since the server resides on the private network, users can access the console only from within the private network. A network implementation is suitable for organizations where all locations are within the private network.


Hosted implementation

In a hosted WIPS implementation, sensors are installed inside a private network. However, the server is hosted in secure data center and is accessible on the Internet. Users can access the WIPS console from anywhere on the Internet. A hosted WIPS implementation is as secure as a network implementation because the data flow is encrypted between sensors and server, as well as between server and console. A hosted WIPS implementation requires very little configuration because the sensors are programmed to automatically look for the server on the Internet over a secure TLS connection. For a large organization with locations that are not a part of a private network, a hosted WIPS implementation simplifies deployment significantly because sensors connect to the Server over the Internet without requiring any special configuration. Additionally, the Console can be accessed securely from anywhere on the Internet. Hosted WIPS implementations are available in an on-demand, subscription-based
software as a service Software as a service (SaaS ) is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. SaaS is also known as "on-demand software" and Web-based/Web-hosted software. SaaS is con ...
model. Hosted implementations may be appropriate for organizations looking to fulfill the minimum scanning requirements of PCI DSS.


See also

*
Wardriving Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet. Warbiking, warcycling, warwalking and similar use the sam ...
* Wireless LAN security * Typhoid adware


References

{{Reflist Wireless networking Data security Secure communication