Wireless intrusion detection

2
Wireless IDS systems have started to emerge in an effort to assist IT person- nel in detecting malicious activities on a wireless network. The scope and com- plexity of the current offering of wireless IDS’s vary dramatically. From home- grown wireless IDS’s based on open source software to plug-ins to large com- mercial IDS/IPS systems, there are many options available today for those interested in detecting wireless LAN attacks. Purpose of wireless IDS It is important to understand the breadth of the wireless security space in order to understand what a wireless IDS should really be doing. There is the obvious example of an attacker using a wireless network to launch attacks against wired targets. However, by and large, these attacks are no different from their wired counterparts. Rogue access point detection is an important aspect of wireless IDS. Rogue access points come in two vari- eties. Internal rogue access points are those that (for instance) an employee brings in and plugs into a corporate net- work. The access point is outside the control of IT personnel and serves as a gateway for attackers to enter the enter- prise. It is key to detect these rogue access points as quickly as possible to remove them (and the threat of attack) from your network. The other type of rogue access point is more difficult to control. The external rogue access point is one that is con- trolled by an attacker and designed to spoof legitimate clients into connecting to it rather than the correct access point. Usually this is accomplished by setting the rogue access point SSID to the same SSID as the friendly access point and then boosting the signal of the rogue access point. This will cause client associ- ations to come to the rogue access point. The attacker may then attempt to steal user’s credentials via spoofed Web pages and portals designed to trick users into giving up passwords, credit card numbers and other personal information. These types of rogue access points are generally easy to detect but difficult to turn off as the attacker then needs to be physically located. Other types of attacks include MAC address spoofing by an attacker to bypass access control lists, password guessing for 802.1x authentication methods that rely on passwords, denial-of-service attacks against the wireless infrastructure, session hijacking, and clients using weak IV’s in standard WEP that allow attackers to determine the WEP key with ease. These and other wireless attacks are supported by free tools from the Internet enabling unsophisticated users to launch them on any network. Commercial products Given the size of the wireless LAN mar- ket, many companies have been running to create and sell wireless IDS systems. Airdefense is a company focused on creating wireless security products. 1 Their flagship wireless IDS has been around for a number of years and has matured with respect to the technology and the integration in enter- prise management systems. The appli- ance-based solution goes beyond a wireless IDS to provide diagnostic and fault information on wireless LAN deployments. While new to the IDS scene, Airdefense has a solid grasp of wireless security and has built a capable product. Internet Security Systems (ISS) is a well-known wired IDS vendor with a vast product line. 2 Their wireless offering, however, is limited to a wire- less scanner that watches for rogue access points and clients using weak connections. It is not a full-fledged wireless IDS in the sense that it does not cover the breadth of wireless-specific attacks pos- sible on a wireless LAN. However, ISS’s wireless scanner integrates well into their products. This allows enterprises that already use the other ISS products to easily integrate a baseline level of wireless intrusion detection. There are many other wireless IDS products on the market. The majority of IDS vendors either have some wireless 4 wireless security Wireless intrusion detection Bruce Potter As wireless LAN’s have gained popularity, so have attacks against them. Attackers can exploit rogue access points within an enterprise or poorly configured hotspots to launch attacks. These attacks may be targeted at a client workstation, an internal server, or ultimately a remote Internet-connected host. Unfortunately, standard IDS products are unable to detect attacks specifically against a wireless network. W W I R E L E S S W I R E L E S S S E C U R I T Y S E C U R I T Y Wireless IDS systems are starting to emerge

Transcript of Wireless intrusion detection

Wireless IDS systems have started toemerge in an effort to assist IT person-nel in detecting malicious activities on awireless network. The scope and com-plexity of the current offering of wirelessIDS’s vary dramatically. From home-grown wireless IDS’s based on opensource software to plug-ins to large com-mercial IDS/IPS systems, there aremany options available today for thoseinterested in detecting wireless LANattacks.

Purpose of wireless IDSIt is important to understand the breadthof the wireless security space in order tounderstand what a wireless IDS shouldreally be doing. There is the obviousexample of an attacker using a wirelessnetwork to launch attacks against wiredtargets. However, by and large, theseattacks are no different from their wiredcounterparts.

Rogue access point detection is animportant aspect of wireless IDS.Rogue access points come in two vari-eties. Internal rogue access points arethose that (for instance) an employeebrings in and plugs into a corporate net-work. The access point is outside thecontrol of IT personnel and serves as agateway for attackers to enter the enter-prise. It is key to detect these rogueaccess points as quickly as possible toremove them (and the threat of attack)from your network.

The other type of rogue access point ismore difficult to control. The external

rogue access point is one that is con-trolled by an attacker and designed tospoof legitimate clients into connectingto it rather than the correct access point.Usually this is accomplished by settingthe rogue access point SSID to the sameSSID as the friendly access point andthen boosting the signal of the rogueaccess point. This will cause client associ-ations to come to the rogue access point.The attacker may then attempt to stealuser’s credentials via spoofed Web pagesand portals designed to trick users intogiving up passwords, credit card numbersand other personal information. Thesetypes of rogue access points are generallyeasy to detect but difficult to turn off asthe attacker then needs to be physicallylocated.

Other types of attacks include MACaddress spoofing by an attacker to bypassaccess control lists, password guessing for802.1x authentication methods that relyon passwords, denial-of-service attacksagainst the wireless infrastructure, sessionhijacking, and clients using weak IV’s instandard WEP that allow attackers to

determine the WEP key with ease. Theseand other wireless attacks are supportedby free tools from the Internet enablingunsophisticated users to launch them onany network.

Commercial productsGiven the size of the wireless LAN mar-ket, many companies have been runningto create and sell wireless IDS systems. Airdefense is a company focused on creating wireless securityproducts.1 Their flagship wireless IDShas been around for a number of years and has matured with respect to thetechnology and the integration in enter-prise management systems. The appli-ance-based solution goes beyond awireless IDS to provide diagnostic andfault information on wireless LANdeployments. While new to the IDSscene, Airdefense has a solid grasp ofwireless security and has built a capableproduct.

Internet Security Systems (ISS) is a well-known wired IDS vendor with a vast product line.2 Their wirelessoffering, however, is limited to a wire-less scanner that watches for rogueaccess points and clients using weak connections. It is not a full-fledged wireless IDS in the sense that it does not cover the breadth of wireless-specific attacks pos-sible on a wireless LAN. However, ISS’s wireless scanner integrates well into their products. This allows enterprises that already use theother ISS products to easily integrate abaseline level of wireless intrusiondetection.

There are many other wireless IDSproducts on the market. The majorityof IDS vendors either have some wireless

4

wireless security

W

W I RE LESSW I RE LESS SECURITYSECURITYWireless intrusion detectionBruce Potter

As wireless LAN’s have gained popularity, so have attacks against them. Attackerscan exploit rogue access points within an enterprise or poorly configuredhotspots to launch attacks. These attacks may be targeted at a client workstation,an internal server, or ultimately a remote Internet-connected host.Unfortunately, standard IDS products are unable to detect attacks specificallyagainst a wireless network.

W

W I RE LESSW I RE LESS SECURITYSECURITY

Wireless IDS systems arestarting to emerge

functionality or plan to have wirelesssupport in the near future. There arealso new companies developing wirelessIDS products that may suit the needs ofmany enterprises. As this marketmatures, the feature set offered by thesevendors will homogenize, easing the taskof selection.

Open source optionsOn the open source front, there are some complete wireless IDS systems and there are other wireless utilities thatcan be utilized (with some supportingcode and process) as a wireless IDS.Snort-wireless is a wireless IDS designedto integrate into a Snort 2.x environ-ment. 3 Snort is the most widelydeployed open source IDS, so a wirelessplug-in makes sense for many enterpris-es. Snort-wireless allows for customrules to be created based on framinginformation from a wireless packet. Italso contains rules to attempt to findrogue access points, wardrivers, and adhoc networks.

Kismet is a utility commonly used forwardriving.4 However, starting withKismet 2, a distributed ‘sensor’ based model has been adopted. Thisallows for multiple Kismet sensors to be placed around an enterprise andreporting wireless events back to a centralconsole. This is a very common architecture for IDS’s; so many havetaken to using Kismet as a wireless IDSsystem. Via some custom software andhomemade attack rules, Kismet can makea very effective and extensible wirelessIDS.

LimitationsWireless IDS is a new product area, andas such, there are still plenty of roughedges and problems to overcome.Probably the foremost problem for most is the deployment of sensors.Unlike a wired IDS where sensors can be deployed at chokepoints within a log-ical infrastructure (a central switch, in front of/behind a firewall, etc.) wireless IDS sensors need to be installed

based on physical location. Sensorsmust be able to pick up radio signalsfrom all legitimate and malicious sourcesyou care able. This means that internaldata centers, office space, and even park-ing lots need to have sensors to ensure allactors are detected.

Further, wireless IDS’s cannot detectwhen an attacker is passively sniffing data.A savvy attacker will spend time sniffing anetwork before transmitting any frames.

This ‘quiet’ period of passive recon ispotentially quite dangerous to an enter-prise, but due to the nature of wireless transmissions, there is nothing awireless IDS can do about it. To prevent a passive sniffer from obtainingcritical information about your infra-structure, it is key that all wireless usersuse proper link-level and network levelencryption.

This underscores the fact that a wireless IDS system, like their wired brethren, is only a part of the security puzzle. Proper policy, proce-dures, configuration, and auditing allmust be used in conjunction with a wireless intrusion detection system tokeep your wireless network safe andsecure.

References:

1http://www.airdefense.net/ 2 http://www.iss.net/ 3 http://www.snort-wireless.org/4 http://www.kismetwireless.net/

About the authorBruce Potter has a broad information secu-rity background that includes deployment ofwireless networks. Trained in computer sci-ence at the University of Alaska Fairbanks,he served as a senior technologist at severalhi-tech companies. Bruce is the founder andPresident of Capital Area Wireless Network.In 1999 he founded The Shmoo Group.Bruce co-authored 802.11 Security pub-lished through O'Reilly and Associates andhas co-authored Mac OS X Security. He iscurrently a senior security consultant atBooz Allen Hamilton.

5

wireless security

Wireless IDS’s cannotdetect when an attacker is

passively sniffing data