beautypg.com

Wlan security configuration, Wlan security overview, Wids attack detection – H3C Technologies H3C WA3600 Series Access Points User Manual

Page 438: Flood attack detection, Spoofing attack detection

background image

425

WLAN security configuration

WLAN security overview

802.11 networks are susceptible to a wide array of threats such as unauthorized access points and clients,

ad hoc networks, and Denial of Service (DoS) attacks. To ensure security, the wireless intrusion detection
system (WIDS) is introduced. WIDS provides early detection of malicious attacks and intrusions on a

wireless network without affecting network performance, and provides real-time countermeasures.
WLAN security provides these features:

WIDS attack detection

Blacklist and white list

WIDS attack detection

The WIDS attack detection function detects intrusions or attacks on a WLAN network, and informs the

network administrator of the attacks through recording information or sending logs. WIDS detection

supports detection of the following attacks:

Flood attack

Spoofing attack

Weak IV attack

Flood attack detection

A flood attack refers to the case where WLAN devices receive large volumes of frames of the same kind
within a short span of time. When this occurs, the WLAN devices are overwhelmed with frames from this

device and frames from authorized clients get dropped.
WIDS attacks detection counters this flood attack by constantly keeping track of the density of traffic

generated by each device. When this density exceeds the tolerance limit, the device is considered to be

flooding the network. Subsequent frames from this device are not processed. If the dynamic blacklist
feature is enabled, the detected device is added to the blacklist, and is forbidden to access the WLAN

for a period of time.
WIDS detects the following types of frames:

Authentication requests and de-authentication requests

Association requests, disassociation requests and reassociation requests

Probe requests

802.11 null data frames

802.11 action frames.

Spoofing attack detection

In this kind of attack, a potential attacker can send frames in the air on behalf of another device. For

instance, a client in a WLAN has been associated with an AP and works normally. In this case, a

spoofed de-authentication frame can cause a client to get de-authenticated from the network and can
affect the normal operation of the WLAN.

This manual is related to the following products: