Knowledge

Wireless intrusion prevention system

Source 📝

265:
For a large organization with locations that are not a part of a private network, a hosted WIPS implementation simplifies deployment significantly because sensors connect to the Server over the Internet without requiring any special configuration. Additionally, the Console can be accessed securely
231:
In a WIPS implementation, users first define the operating wireless policies in the WIPS. The WIPS sensors then analyze the traffic in the air and send this information to WIPS server. The WIPS server correlates the information, validates it against the defined policies, and classifies if it is a
257:
In a hosted WIPS implementation, sensors are installed inside a private network. However, the server is hosted in secure data center and is accessible on the Internet. Users can access the WIPS console from anywhere on the Internet. A hosted WIPS implementation is as secure as a network
258:
implementation because the data flow is encrypted between sensors and server, as well as between server and console. A hosted WIPS implementation requires very little configuration because the sensors are programmed to automatically look for the server on the Internet over a secure
131:
approach to weed out devices with spoofed MAC addresses. The idea is to compare the unique signatures exhibited by the signals emitted by each wireless device against the known signatures of pre-authorized, known wireless devices.
112:(WIDS) monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools. The system monitors the radio spectrum used by wireless LANs, and immediately alerts a 246:
Sensors communicate with the server over a private network using a private port. Since the server resides on the private network, users can access the console only from within the private network.
356: 70:
infrastructure, although they may be deployed standalone to enforce no-wireless policies within an organization. Some advanced wireless infrastructure has integrated WIPS capabilities.
232:
threat. The administrator of the WIPS is then notified of the threat, or, if a policy has been set accordingly, the WIPS takes automatic protection measures.
17: 360: 243:
In a network WIPS implementation, server, sensors and the console are all placed inside a private network and are not accessible from the Internet.
224:
placed throughout the facility. For huge organizations, a Multi Network Controller provides central control of multiple WIPS servers, while for
204:— These devices contain antennas and radios that scan the wireless spectrum for packets and are installed throughout areas to be protected 273:
model. Hosted implementations may be appropriate for organizations looking to fulfill the minimum scanning requirements of PCI DSS.
144:. For automatic prevention, it is required that the WIPS is able to accurately detect and automatically classify a threat. 66:
and other information assets by wireless devices. These systems are typically implemented as an overlay to an existing
220:
A simple intrusion detection system can be a single computer, connected to a wireless signal processing device, and
411: 374: 312: 181: 333: 401: 249:
A network implementation is suitable for organizations where all locations are within the private network.
216:— The console provides the primary user interface into the system for administration and reporting 259: 225: 186: 166: 140:
In addition to intrusion detection, a WIPS also includes features that prevent against the threat
406: 287: 270: 113: 44: 128: 116:
whenever a rogue access point is detected. Conventionally it is achieved by comparing the
8: 107: 154:– WIPS should understand the difference between rogue APs and external (neighbor's) APs 151: 78: 63: 96:
recommending the use of WIPS to automate wireless scanning for large organizations.
36: 235:
WIPS is configured as either a network implementation or a hosted implementation.
221: 124: 82: 292: 81:. If an employee (trusted entity) in a location brings in an easily available 40: 269:
Hosted WIPS implementations are available in an on-demand, subscription-based
395: 228:
or SMB customers, all the functionality of WIPS is available in single box.
127:
MAC address of an authorized network device as their own. New research uses
85:, the entire network can be exposed to anyone within range of the signals. 67: 62:
The primary purpose of a WIPS is to prevent unauthorized network access to
117: 282: 89: 210:— The WIPS server centrally analyzes packets captured by sensors 28: 74: 93: 147:
The following types of threats can be prevented by a good WIPS:
77:
are particularly vulnerable to security breaches caused by
197:WIPS configurations consist of three components: 393: 357:"University research aims at more secure Wi-Fi" 50:, and can automatically take countermeasures 313:"Fitting the WLAN Security pieces together" 238: 252: 135: 120:of the participating wireless devices. 14: 394: 99: 33:wireless intrusion prevention system 18:Wireless Intrusion Prevention System 375:"Security SaaS hits WLAN community" 24: 92:published wireless guidelines for 25: 423: 192: 43:for the presence of unauthorized 266:from anywhere on the Internet. 367: 349: 326: 305: 90:PCI Security Standards Council 73:Large organizations with many 13: 1: 334:"PCI DSS Wireless Guidelines" 298: 7: 276: 10: 428: 57: 39:device that monitors the 187:Denial-of-service attack 167:Man-in-the-middle attack 163:Unauthorized association 363:on September 26, 2007. 239:Network implementation 160:Client mis-association 52:(intrusion prevention) 288:Wireless LAN security 271:software as a service 253:Hosted implementation 114:systems administrator 48:(intrusion detection) 412:Secure communication 136:Intrusion prevention 402:Wireless networking 152:Rogue access points 108:intrusion detection 100:Intrusion detection 79:rogue access points 64:local area networks 377:. networkworld.com 123:Rogue devices can 88:In July 2009, the 157:Mis-configured AP 16:(Redirected from 419: 386: 385: 383: 382: 371: 365: 364: 359:. Archived from 353: 347: 346: 344: 343: 338: 330: 324: 323: 321: 320: 309: 182:evil twin attack 21: 427: 426: 422: 421: 420: 418: 417: 416: 392: 391: 390: 389: 380: 378: 373: 372: 368: 355: 354: 350: 341: 339: 336: 332: 331: 327: 318: 316: 311: 310: 306: 301: 279: 255: 241: 195: 138: 102: 83:wireless router 60: 23: 22: 15: 12: 11: 5: 425: 415: 414: 409: 404: 388: 387: 366: 348: 325: 303: 302: 300: 297: 296: 295: 293:Typhoid adware 290: 285: 278: 275: 254: 251: 240: 237: 218: 217: 211: 205: 194: 193:Implementation 191: 190: 189: 184: 178: 175: 169: 164: 161: 158: 155: 137: 134: 129:fingerprinting 101: 98: 59: 56: 41:radio spectrum 9: 6: 4: 3: 2: 424: 413: 410: 408: 407:Data security 405: 403: 400: 399: 397: 376: 370: 362: 358: 352: 335: 329: 315:. pcworld.com 314: 308: 304: 294: 291: 289: 286: 284: 281: 280: 274: 272: 267: 263: 261: 250: 247: 244: 236: 233: 229: 227: 223: 215: 212: 209: 206: 203: 200: 199: 198: 188: 185: 183: 179: 176: 173: 170: 168: 165: 162: 159: 156: 153: 150: 149: 148: 145: 143: 142:automatically 133: 130: 126: 121: 119: 115: 111: 109: 97: 95: 91: 86: 84: 80: 76: 71: 69: 65: 55: 53: 49: 46: 45:access points 42: 38: 34: 30: 19: 379:. Retrieved 369: 361:the original 351: 340:. Retrieved 328: 317:. Retrieved 307: 268: 264: 262:connection. 256: 248: 245: 242: 234: 230: 219: 213: 207: 201: 196: 177:MAC spoofing 171: 146: 141: 139: 122: 105: 103: 87: 72: 68:Wireless LAN 61: 51: 47: 35:(WIPS) is a 32: 26: 180:Honeypot / 118:MAC address 396:Categories 381:2008-04-07 342:2009-07-16 319:2008-10-30 299:References 283:Wardriving 106:wireless 75:employees 29:computing 277:See also 222:antennas 174:networks 214:Console 202:Sensors 94:PCI DSS 58:Purpose 37:network 208:Server 172:Ad hoc 110:system 337:(PDF) 125:spoof 226:SOHO 31:, a 260:TLS 27:In 398:: 104:A 54:. 384:. 345:. 322:. 20:)

Index

Wireless Intrusion Prevention System
computing
network
radio spectrum
access points
local area networks
Wireless LAN
employees
rogue access points
wireless router
PCI Security Standards Council
PCI DSS
intrusion detection
systems administrator
MAC address
spoof
fingerprinting
Rogue access points
Man-in-the-middle attack
evil twin attack
Denial-of-service attack
antennas
SOHO
TLS
software as a service
Wardriving
Wireless LAN security
Typhoid adware
"Fitting the WLAN Security pieces together"
"PCI DSS Wireless Guidelines"

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.