AirDefense, AirMagnet, Highwall Track Down Attacks

 
 
By Andrew Garcia  |  Posted 2004-08-07 Email Print this article Print
 
 
 
 
 
 
 

eWEEK Labs tests three overlay wireless intrusion detection systems.

eWEEK Labs invited several vendors of overlay wireless intrusion detection systems to submit products for our tests, and three obliged. AirDefense Inc. submitted AirDefense 4.0, priced at $10,000 for the server appliance and five sensors. AirMagnet Inc. delivered its AirMagnet Distributed 4.0, whose starter kit of server software, management console and four sensors is priced at $7,995. Highwall Technologies Ltd. sent its Rogue Detection System 2.0, which includes the $5,000 central management software, the $1,995 Highwall Sentinel 1000 sensor unit and the $1,995 Highwall Scout 2000 antenna for extended-range coverage for 802.11b and 802.11g detection.

Click here to read eWEEK Labs analysis of wireless security options.
AirMagnet and AirDefense use off-the-shelf sensors licensed from Senao International Co. Ltd., but each uses them differently. AirDefense sensors strip the wireless packet headers and ship them to the central server for processing and correlation routines. AirMagnet sensors perform processing at the edge device, so each sensor keeps operating if the central server fails.

CBK, a wholesaler of home accents, is using AirMagnets overlay product to shut down rogue access points. Click here to read the Labs case study. Meanwhile, Highwall has designed its sensors and antennas for extremely long-range detection capabilities that can perform moderately effective location mapping from a single Sentinel/Scout pair.

In tests, we expected each product to effectively discover and identify unknown clients, ad hoc networks and access points. Given our offices location—a high-rise in downtown San Francisco—we also expected to see numerous unknown devices outside our purview. We therefore focused on each products ability to spot wireless denial-of-service attacks and potential man-in-the-middle exploits, where managed clients attempt to associate with unknown networks or devices.

Using Cisco Systems Inc.s Linksys WAP55AG 802.11a-/b-/g-compliant access points, we deployed a WLAN (wireless LAN) throughout our offices, then configured the server and sensors of each WLAN IDS (intrusion detection system) to monitor this network. We defined each of our known access points as a known, managed device to the overlay solutions. We then deployed a rogue access point configured with the same network name but outside our managed network.

Using the open-source application Void11 (available at www.wlsec.net) in conjunction with the Host AP drivers for Prism2-based adapters on Linux (hostap.esitest.fi), we directed a deauthentication attack against a managed client associated with our network. In this manner, we hoped to detect the attack and monitor the clients attempts to associate with the rogue access point after disconnecting from our WLAN.

All three products identified both our rogue access point and the deauthentication attack from our Void11 workstation, but AirMagnet provided the most complete information about it, identifying the correct attack tool and explaining in depth the implications of the attack.

Spotting our managed clients associations with rogue access points was not as straightforward, with the information easily getting lost in the glut of data and alerts each product provides. For maximum effectiveness, administrators must import lists of the hardware addresses of all known devices—a potentially arduous task, given the proliferation of wireless client devices throughout the enterprise.

Check out eWEEK.coms Mobile & Wireless Center at http://wireless.eweek.com for the latest news, reviews and analysis.

Be sure to add our eWEEK.com mobile and wireless news feed to your RSS newsreader or My Yahoo page

 
 
 
 
Andrew cut his teeth as a systems administrator at the University of California, learning the ins and outs of server migration, Windows desktop management, Unix and Novell administration. After a tour of duty as a team leader for PC Magazine's Labs, Andrew turned to system integration - providing network, server, and desktop consulting services for small businesses throughout the Bay Area. With eWEEK Labs since 2003, Andrew concentrates on wireless networking technologies while moonlighting with Microsoft Windows, mobile devices and management, and unified communications. He produces product reviews, technology analysis and opinion pieces for eWEEK.com, eWEEK magazine, and the Labs' Release Notes blog. Follow Andrew on Twitter at andrewrgarcia, or reach him by email at agarcia@eweek.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel