Monday 26 May 2014

Wireless Security from Attacks

Personal network often requried WPA2 - PSK to secure their network.

But Enterprise network managers too often assume strong encryption equals strong security for wireless LAN (WLAN) traffic

Certainly, WPA2 Enterprise offers better authentication and encryption options than many organizations deploy in their wired networks. But WLANs involve many other potential vulnerabilities: Rogue access points (APs); denial-of-service attacks against clients; and targeted attacks against WLAN infrastructure all can lead to leakage of sensitive data. The threat to enterprise WLANs is real and growing

Some of them features required in the real word from these attacks,

1. Rogue AP Detection & Rogue Containment
   A rogue access point is an AP not sanctioned or authorized by network administrators. Typically, rogue APs are connected to a network by well-intentioned employees unaware of the security risks they cause. Enhanced security monitoring enables faster response to these security breaches by performing the Security functions.
Once a rogue AP has been detected and classified, Dedicated air monitors provide a more effective way to perform rogue AP containment without negatively impacting the performance of the wireless network.

2. Protecting Wireless Client
   Valid Client on Unencrypted SSID
   Valid Client on Rogue AP With Valid SSID
   Penetration Attacks Against Valid Clients
     Disconnect Station Attacks
     Client Flooding Attacks
     Block ACK Attacks

3. Protecting Wireless Infrastructure
   Deauthentication and Disassociation Broadcast Attacks
   Frame Rate Anomaly Attacks
   Malformed Frame Attacks

Dedicated AMs or Sensors, Wireless Controller Combined with Wired NMS System provide a number of security-related enhancements over others.




No comments:

Post a Comment